87] dump_stack+0x11d/0x181 [ 323.591108][ T9987] should_fail.cold+0xa/0x1a [ 323.595724][ T9987] __should_failslab+0xee/0x130 [ 323.600605][ T9987] should_failslab+0x9/0x14 [ 323.605118][ T9987] __kmalloc+0x53/0x690 [ 323.609388][ T9987] ? tomoyo_encode2.part.0+0xd9/0x260 [ 323.614783][ T9987] tomoyo_encode2.part.0+0xd9/0x260 [ 323.619997][ T9987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.626293][ T9987] tomoyo_encode+0x34/0x50 02:30:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 323.630716][ T9987] tomoyo_realpath_from_path+0x14a/0x4c0 [ 323.636474][ T9987] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 323.641876][ T9987] tomoyo_path_number_perm+0x10a/0x3c0 [ 323.647427][ T9987] ? __fget+0xb8/0x1d0 [ 323.651515][ T9987] tomoyo_file_ioctl+0x2c/0x40 [ 323.656328][ T9987] security_file_ioctl+0x6d/0xa0 [ 323.661355][ T9987] ksys_ioctl+0x64/0xe0 [ 323.665523][ T9987] __x64_sys_ioctl+0x4c/0x60 [ 323.670135][ T9987] do_syscall_64+0xcc/0x3a0 [ 323.674687][ T9987] entry_SYSCALL_64_after_hwframe+0x44/0xa9 02:30:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xae41, 0x0) [ 323.680580][ T9987] RIP: 0033:0x45a919 [ 323.684488][ T9987] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.705158][ T9987] RSP: 002b:00007fbb85df6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.713594][ T9987] RAX: ffffffffffffffda RBX: 00007fbb85df6c90 RCX: 000000000045a919 [ 323.721570][ T9987] RDX: 00000000200000c0 RSI: 0000000000004c04 RDI: 0000000000000003 [ 323.729638][ T9987] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 323.737642][ T9987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbb85df76d4 [ 323.745720][ T9987] R13: 00000000004c4569 R14: 00000000004d9d20 R15: 0000000000000005 02:30:52 executing program 2: r0 = getpid() execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f0000001200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x10000, 0x1f, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_thread_area(&(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000100)={0x3, 0x0, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r5, 0x80044dfe, &(0x7f0000000280)) pidfd_send_signal(r5, 0x40008, &(0x7f0000000300)={0x5, 0x0, 0x2}, 0x0) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x9, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x629cbebc) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r7) getrusage(0x1, &(0x7f00000004c0)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x40002, &(0x7f0000000400)={'trans=unix,', {[{@uname={'uname'}}], [{@euid_gt={'euid>', r7}}, {@permit_directio='permit_directio'}, {@smackfsroot={'smackfsroot', 0x3d, 'security^eth1lo{'}}, {@uid_gt={'uid>', r8}}, {@obj_type={'obj_type', 0x3d, 'em0'}}, {@subj_role={'subj_role', 0x3d, '/dev/v4l-subdev#\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x10e9}}]}}) r9 = dup3(r2, r3, 0x0) r10 = dup2(r9, r4) ioctl$SNDCTL_DSP_GETISPACE(r10, 0x8010500d, &(0x7f0000000040)) ioctl$VIDIOC_ENUM_FMT(r10, 0xc0405602, &(0x7f0000000140)={0x2, 0x0, 0x1, "f2b931da2f9de052bf4246bab2f4ccd1aa026f6bfaf71f524e06f7fa2ca3e7d9", 0x4c314356}) [ 323.802149][ T9989] device nr0 entered promiscuous mode [ 323.888677][ T9995] K: renamed from caif0 02:30:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xae80, 0x0) 02:30:52 executing program 4: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 323.929862][ T9987] ERROR: Out of memory at tomoyo_realpath_from_path. 02:30:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 323.980884][T10010] ptrace attach of "/root/syz-executor.5"[10008] was attempted by "/root/syz-executor.5"[10010] 02:30:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x400454ca, 0x0) [ 324.132224][ T9995] device K entered promiscuous mode [ 324.149411][T10006] Unknown ioctl -1072409080 [ 324.158976][ T9995] A link change request failed with some changes committed already. Interface K may have been left with an inconsistent configuration, please check. [ 324.196850][T10020] ptrace attach of "/root/syz-executor.5"[10019] was attempted by "/root/syz-executor.5"[10020] [ 324.212540][T10006] Unknown ioctl -2147201538 02:30:52 executing program 4: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:52 executing program 1 (fault-call:3 fault-nth:2): r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:52 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x40049409, 0x0) [ 324.386346][ T9995] A link change request failed with some changes committed already. Interface K may have been left with an inconsistent configuration, please check. 02:30:53 executing program 4: ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x40186366, 0x0) 02:30:53 executing program 2: r0 = getpid() execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f0000001200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x10000, 0x1f, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x1000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_thread_area(&(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x2000, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000100)={0x3, 0x0, 0x1}) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r5, 0x80044dfe, &(0x7f0000000280)) pidfd_send_signal(r5, 0x40008, &(0x7f0000000300)={0x5, 0x0, 0x2}, 0x0) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0x9, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x629cbebc) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r7) getrusage(0x1, &(0x7f00000004c0)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$9p_unix(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x40002, &(0x7f0000000400)={'trans=unix,', {[{@uname={'uname'}}], [{@euid_gt={'euid>', r7}}, {@permit_directio='permit_directio'}, {@smackfsroot={'smackfsroot', 0x3d, 'security^eth1lo{'}}, {@uid_gt={'uid>', r8}}, {@obj_type={'obj_type', 0x3d, 'em0'}}, {@subj_role={'subj_role', 0x3d, '/dev/v4l-subdev#\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x10e9}}]}}) r9 = dup3(r2, r3, 0x0) r10 = dup2(r9, r4) ioctl$SNDCTL_DSP_GETISPACE(r10, 0x8010500d, &(0x7f0000000040)) ioctl$VIDIOC_ENUM_FMT(r10, 0xc0405602, &(0x7f0000000140)={0x2, 0x0, 0x1, "f2b931da2f9de052bf4246bab2f4ccd1aa026f6bfaf71f524e06f7fa2ca3e7d9", 0x4c314356}) 02:30:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:53 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x234, 0x2, 0x6, 0x7, 0x10001}, 0x14) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0)={'\xfcyz'}, 0x0, 0x0, r1) r2 = fsopen(&(0x7f0000000000)='cgroup\x00', 0x2) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000040)={0x0, 0x6, 0x3, 0x800, 0x80000000}) keyctl$revoke(0x3, r1) 02:30:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:53 executing program 4: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 324.875473][T10055] Unknown ioctl -1072409080 02:30:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 324.939868][T10050] Unknown ioctl -2147201538 02:30:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4020940d, 0x0) 02:30:53 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r4, r4) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000100)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r5, 0x0, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000080)='/\x00') openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x100, 0x0) sendfile(r0, r3, 0x0, 0x80001d00c0d0) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="74727573f465642e00c55d4affd966d78937841dcd1fc487060750e70eb41e4b59a95bcd3d451f6d8d991543683ef225af763db4"], &(0x7f0000000180)=""/213, 0xd5) 02:30:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:53 executing program 4: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:53 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0x4000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = getpid() process_vm_readv(r4, &(0x7f0000000780)=[{&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {0x0}], 0x3, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r5 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r5, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r6 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r6, 0xc0305602, &(0x7f0000003640)={0x0, 0x83, 0x1007, 0x3}) getpid() pread64(r2, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r7 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r7, &(0x7f0000004300)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="6fcd79c7e16b45503b5ffca1bda99248abba3beef6fb8cede97b625c69a7a72b1aab4f5209f3e282e203daa4c176e9d46a46fd31f9e35b8fb83ac45b55acd3c4f252622fa22ee2dd9db6150513cce522f1ab687f8c4d8f9373d11a076a9f78a64612da9ca0c11e5073b09bb67e89335a5a4b3ef1b3b2", 0x76}], 0x1, &(0x7f0000000400)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x48, 0x40000}, {0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000480)="321f28501bc20c49851b989c9d0c0152df1cc6acbd45a9147610fbd7cd0043c7d289b6631165d5e0d590fd314183d195e32a1f1209c79b68054e85fa699aaa2ce3e88396c9f5957909296d57a6720e5818785558e7954ede29615c52fda0fcf402076c26ddb823b0689d866c900734a83d948b61a724523e41c7fca5d3530cf442312253e8e95ca10b7d5c3345c6", 0x8e}, {&(0x7f0000000880)="17e2394a51115be7a76bb4d0a58d9cb44745ff4a6eed4c535aa83e5a0cbc22bc6a138a56dedd07fa58af17f6cea829b54cf4b280d5e69df41235de7c02a830f421706f790e151a17e55e852edb7163b44fd6f0338d8aa6e5126f74608bf7af2a03dae848ff23b49b3ce7ddf65697d91ba4445623b220826be7a8ce9a60e774756b8b587e617031f72391cedfeee8820dca84c63a5232dbc9d9c22065f9c1371ee32d5490b42f524650c01e5ecb920bce8f544d31b1c75b4144c09834c6ce94becdb06763348d3f69ea585ae62eb7f352b0ac738e68c94112ebc029350ee672159226faa6d35c5dd1cdde28", 0xeb}, {&(0x7f0000000980)="bfef85a3963296518524d8ee125921e9bbe65dde06a569f2f65f65ee5738654be922ab380e8092c438a99ccc0dfb966b112943bb7575b93b661335c5ee8e956bb9c47a13a5d3029818f6f1533c04e04a0b861ff49bdd9a8135effd0618605f0683d5b6975a43e354134b10c8b914e71535bf0afca9b425e0edd587415251fe410cb43dcfbf0a39aa8c34278a77716a28b1e18643bcfc6ac4fa1e0ca9c61e0d11822bf4f4bfb2d9acaf23aad64aa3859b1ef751576f0a720b5d3c6fe9d47d659c0e5c17e1fabbf2df41454faf5b41bdf70e95e3ff5fc79447d2c53bb0c1ba455401b4e71ecb296f7d125b0286f666e88197", 0xf1}, {&(0x7f00000007c0)="6ab9387d3f510dc28e2979d5b9fbcbf5385f7bb331edcffe1fab3ad5d4e90e97ad5dcdfe57d4aad358ad034dcda369f3a7fb3be3fb20ccbd94c947be6462770320a3ce71ed9a06eec9adf88b6e18966a992e996aa3049aa155f5c23da9", 0x5d}, {&(0x7f0000000a80)="bac92540d9dff396278f11d48c3da873dc853a3c8cb34c314bdec0e2f19ab7f0e1ac543e3cbab6c5985fa283c97c05094718a27134477dc69b5f0e20fe77c7c8259ee741a5e4e33e80461a94defed539c492e207b90d54eb25c8c63e06a39c636dcec8f3c3948230052614e8506ecd418afd9418f070ace449607514c71137ff2af9dfa67a7e2d2da6b2d89613b3da392311e716b3b96d094b21a1baca6c403f9c2c99a17536ecd066e54f6a8e6294df97bcec134718142e2887ebb0f49c291f85ed8fcefa82aded5deb3e46a4643d5cc95e2429409c9543071e7b98", 0xdc}], 0x5, &(0x7f0000000c00)=[@iv={0xf0, 0x117, 0x2, 0xdc, "887b4ce67926a4c3813a10150feb92896d1084d85b3024d8936aa0003f90106c8bf63b70e2c20a96e7812c2ff1e60e501bab65b2ce06ef4879ccbaea1caf184678309bf2a1a369b02aaa059dd3c57074708de8d886c4c02fcbb3ad0d387b7f01530885690d6b5430cbc7e4788a6d9b2836ff3796381f436091251afef271165f1318f7b7136c4b85ce4913bc3bf6a75022db3fd45d3c45ec3b49a85a6b77f5b0de82ee78b1ff3547a182c805e1f70963a46bdaa208a59e10db8a7899f797368dd6e235bf623328583224e6be60fff275d948c5200c3774eb816e61df"}, @iv={0x100, 0x117, 0x2, 0xe9, "0ac84950b702e9ab8e24fa0d0b7e23db77ccd0144a32082f1ae24cdc87639d235da6f6ee7b4d56fd4d737c4cf3b81ffac6599bd64f6c6f8d8c44184a297279a4cb06ad61929be9599eae4c666bf577ef8c20bde30a6f026e456cbc6b3bc79f43dc4f7280108526b3f396467024dec3aa5329745167af366db06e8f0c7da1f3693fe65d27eec75071b9ba39cc4377d1a9196bf70d200a6361176e741534554436c16910df2a2c60af55341e62c371cff6519b9fcb44e85f4b0c68c0e4caad1ca2fc8f5f95f699f69be76f05c6ad64b28f982212ca6b3e4d5e4468a0f990cd0795f1a44950bee188ecb8"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x238, 0x8000}, {0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000200)="5d89d4d1dc2f2144027e23b8bafd9b4b4921", 0x12}, {&(0x7f0000000300)="450ba81dba1e474e4277d9bb", 0xc}, {&(0x7f0000000e40)="00b7c186ae0b745ab05b8598779f073ee88c33544c9368cfd1c220d255ddf7d27bde09093690de4ec576c0c370454ea3e88f8b7b647e5a1a3f91f7cdedac8b1020a89790fd67058f0f15538c442e8ba2e1c4f535a033ce765aca8e54f9eeeb7fa41c68347cd74f6a36831eec2905235a390cd3883e340fa668efe214fa49999aa3071b6495526dcec2ae311ca92821ef087e7289156e8237916de7520f76b66d5db8901d91128978371cba5a25669a1d13fe28e4b3e3a0a87bd8d7937d290c4d1984fd692fccf1dcdf89de24e97edebfb77abfe91b3c318c4703f6f60dca38a9f50379c91ff096a8703b8395fe99d37c2c47a716f5", 0xf5}, {&(0x7f0000000380)="316cfcd193eba46bf0ed3c140bc125f9e9", 0x11}, {&(0x7f0000000740)="ea96922a8ff74ef71384eea91a128fadf0aac4eefc", 0x15}, {&(0x7f0000000f40)="ca25dc2defdefa94bed64b59b235e2f213feda2f05c85f6c51953f5caf67b366f3314e6f64", 0x25}, {&(0x7f0000000f80)="e8cff968988345bbeea45ef30b5c6b51d9b7aad89599e4effbfacfa4c5c63a1ce03d0735a81695", 0x27}], 0x7, &(0x7f0000001040)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18, 0x4}, {0x0, 0x0, &(0x7f0000003240)=[{&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000002080)="667ddc7d4fc28de772c3347077e81c7259df", 0x12}, {&(0x7f00000020c0)="54c2d2305a911c405cc09fa37fe181fe950cb77b5936a0d41f836a1e21ae79b4e56b744e5fe0ece733caf185e49f7c387aba4342dd5c6d9053b3be6813702c3ed5579fcf3b17a01419a85c151b0ecd843350858826fddc435b75d19320c8577d58ab3fa52eaca88bbf973a012bb63cecf95dd02a405914b9b30d2bc0f24ae03dd74dd1c71aea66f9afddc396d41d292a80fb321ceff7ef22ba160edcf2e62a63e1e3848bdfd5e8d98f01251ac326f19f84f51685ad5109909038b00fd1406b45818a4ed4f22df3ce", 0xc8}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="2bfa8b5756732ec87bf7d62f580c3d485e44ec3688ee7d502bd0b5c1800f01a58914", 0x22}, {&(0x7f0000003200)="b30854886b84e3e0a9e4169aa61c787ece32", 0x12}], 0x6, &(0x7f00000032c0)=[@assoc={0x18, 0x117, 0x4, 0x401}, @iv={0x30, 0x117, 0x2, 0x1b, "3f19e9568bee51c0e3bf7c69a7ecb6258dec8402603e8fcf247cda"}, @assoc={0x18, 0x117, 0x4, 0x8}, @iv={0xe8, 0x117, 0x2, 0xcf, "bdb2012e80849bed432213ddcc064317f9481f7fde6651b498fafa166cc59b6570047d180c3dd409cee0ed533b2465462647e2a9203aaddb913cbb0233b849ff64e60ccd9f94fe8adb26c6c426c176abdbcfb7cda7c18ac929c4afacae8ec0f009eacc8c9034a8a8b1aba0f202980e3bd41b4fe2b654ef6c3798d1e3b9ad2dc3f967fac7958ff7bacba21557e460b589ed0174fcf837ab6949139d46b4b43986c5aae03e0a81641b6c8c3562b603372a448f34244571786fcff6a5fdae23d2c680d623c6218dadecf45a1cdd8c33c3"}, @iv={0x20, 0x117, 0x2, 0x9, "18d741e7a9b9fcafce"}, @iv={0x100, 0x117, 0x2, 0xea, "c362f0f1b4a7a1547a2a09afc4b4bc903b9c4271db6a6c35c79d1affaba3f5b898aa4dbc8e6de7f51cd1720cd1205bd0355e8bda125de19c7f4e38a73aa764bb2f60caa86049413752f6d5cdf1d85c98e1f408b02a8090f71955474b196cc6618533ff9df6a30f78a5fa76b3783628c43428dce2ae08bbb5f0f1af796e93c8573605798c2d91be729c70341fca1334ec0c423ad5df6eb006212d35f64d4cdd87857510d9632fb62b7fb557dc5d971c8622524468dcf221607e4081eb5eec58d296019468b8085a707cc473ac675ad643d8c3c32d12ac4ece994e7a121603cb828f2f6ed7aa366bad6113"}, @op={0x18}], 0x280}, {0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000003540)="4a5404da07ab68bf972891bb12294b665b653fe3c449f163fa7bb2b9c49d55033b1b0a30bf03183a480bc379720ffb5febe22ce336e9d61e714fedf6f6c15b87eccf320ed88ae7f65ff63e8a8195e8dfc3b32532ee79b01ec295c2b3dfe97d5ce30d1875813880f702ea634f7383fd34023efab2e588943d2dc6c88c53b28116ce4f8a0493f1dadd112e8c56a33413c2563b990c6f304d980b0bf81026346a2f3537d9d0517d46b7eeecac850ff00d234a897142ceabbdf2838369640610f212df91506686863850367c871fea5a6647af84adce7e71d14b3560cae539a689235916e89734", 0xe5}, {&(0x7f0000003640)}], 0x2, &(0x7f00000036c0)=[@assoc={0x18, 0x117, 0x4, 0x79}], 0x18, 0x20010000}, {0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000003700)="5e2c31333e0d799bbd6a55b02f9e2f213c2eb4b964f5adddbc905f3d245b3ce9ac0f1a786a89f4d2a205fd16d530298b66f11f415b03934c5f8d7c3be84105a15c9a06feaab6c0f9e592dd9be3eb1b78647903f6865d93ffcea1dde8447d44b785809de895df6a65c663e93cdee9994110a09d5312c4a95b626e1f2aec8e82a8d8f8f6935d334422ab14bbe45ec5bf53362a1fc0631eccec3af2cb0ca5dcdb4e6abbf7c86c", 0xa5}, {&(0x7f00000037c0)="e14d434a07fb025b0792cfbac45a2e70387ee3c5db573c269010ebf775cd49b49692fb0f5e7dc46b490855848e6269e658f13178109ad3d4db78dce4d4f7fdffddf4d266556dc553378e02f4d96eb78dfd6aa80224ad414768e2a1214fce3caeed718b0a1070750a3d7bb354858276558edfcad4f0b1898d0d95014abbf95d65e61601dc029808a4438353f23c2db7067ef0d396655042408f3273ae71c9db3d83ca3add4fbcbc782562141a104b", 0xae}], 0x2, &(0x7f00000038c0)=[@iv={0xc8, 0x117, 0x2, 0xb0, "28efd165cc68540aa1ef1c2b285f5cf0118fe4a01dc4646132874264e0781dadda34edd45c1ad05c572afff26625e79139e8ed6e8b04dc2c7c3351b672990bb2a5b94dac226939f84a4b152ce2797d4ca18dbb9f018feee5421d589b43a40123338458e668200851f34551305b9bce5749d88b3e658ac3d180090b767a5e1e4ec2df9393bad40de876683f7a15e548d4ac245c2a1074844b152290090bd504f89abf9cfb8b105e53712026a579a9f0b8"}, @assoc={0x18, 0x117, 0x4, 0x1}], 0xe0, 0x80440e2}, {0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f00000039c0)="92c5b0fb3a828cbb62bb2c1a87d4eabd71a85ee84be15e6b47592c0c3112bc88959e0e255476fb611aa55795532889e76aff144e374e58100e948022b9ff4ecdd8bc879d", 0x44}, {&(0x7f0000003a40)="7991af383dceeb2659e469dd8ff3de04c053c57c5c2b5feb775e7fe260d0d33f894909910286e33d2d36494f34ef9ec131b125255fc055de4be3cdc061c1cae64541209e7883c4ac821fff2de0df", 0x4e}, {&(0x7f0000003ac0)="688606741a159ca0b39f7ac6bbe5cb8163375b1e2004c52cb68b36437c148132c9bdda95700742557a6de0f1edb08872c7e5073df186efd072574e1f0bf49d1ba48d5acb23aea0905e245d6fcb0f2e59619cbcd09a3d16c158522d66340fe06dcd5df0126f9c43a52c9e038d0f4f022bd4b1eea03877ba8d2286971651a847e0f3f0bd21f3f68b77badb51610df823a6d429fa4e5c004f6a75072a1835c5ec059e9558ab1bd69edf7549cae83ee9d8e61ea395cbddb25cb4b3eebd649f1855f2bc14022a79", 0xc5}, {&(0x7f0000003bc0)="d7d53d74f44321445086392acdf53b29fa29bac0b08c8fb8afac1dab13d290d3ecd451005dde6f27fe1a7a30", 0x2c}], 0x4, 0x0, 0x0, 0x800}, {0x0, 0x0, &(0x7f0000004080)=[{&(0x7f0000003c40)="af8662068400aa0b071163971ddbbb14faa122835762cb45158f07d8860c00a4d33a0c6813889a54567b9e5096e9e936612d5533f6d2e0bb1d6f38f3ea2d937b6c287456d3ed7f0edf8b1416587153904c", 0x51}, {&(0x7f0000003cc0)="95abbe68ffd0ecfaf3b4b8a39b6dbeec5f8d50a4488c3cb7707c2813a27328a16ad988d8dcbeba12e6d73a33ab2c3c48353ab65a07c499f78b90b11145426b044e1193141c31f164cc09533fcaaf77ad4e6a1b69c10f9cccdcbc34384941a12c769286daaa4bb18b487f1795e211f8d90715886bf7ef7963eaf8e62bd4b7ade92f8afe63b913d536bd885553af689e7c926a3d897dd1c8084e0e37abedaa5d064271d49db9fbd20122884fb5ee7ebc7e3c33304f7d49c7fae0aafdc0ca40369a4353ebd1", 0xc4}, {&(0x7f0000003dc0)="402710b9bfd44e679edf82c2b7bc730eea3957e03f2d1d439d6a996cd8828cc4ee848687aa6713527b92b628be06003cf954abf879c0ad4812cf57b22b90fe8a41f7387e2055b5098a39afc15b09b36f67c0af9a8425ffa41a0a809215d0ff1873faed91a9466c300336dbe1cb2e562b9b03d487c2a672124386", 0x7a}, {&(0x7f0000003e40)="2a7a1be71796844e2cead0c5d071bf33a57b554fd4971982992c4b337de8a7312b1961ca3210cc14a6169e913ee62ec97fd6e9b41957ce19c1b7c2e67a3f8c43f81976117a3ca12e0bc8a76b0a23808adb73ef2697cb8178f9839299caef6b8cf4f3d8f22184d423b18c3fb5b25d48727c2f449dea6172279c0c22514a1ae68d043138855f80c352b3875539c5bc4f8efe3cc1b8b51b53da0424d4a0c9ad78fde1b69dc9ab", 0xa5}, {&(0x7f0000003f00)="f7dcc961497e6bfcab6f6116eee264f7d2652dcdac936699c9794466aac7fda70023b4cd137a63b93cf396a81cb24c78c2783860ed04f5d6ea108cf673c1536dbf3167b8a3a5d5e8916f4fae5ce323f3d69c9f27d61796fe3a674a16c9974ff4ea1ac9e63105359f303e9074596b26", 0x6f}, {&(0x7f0000003f80)="af65718ed9bf03917549038c3bb5f05818abc1ce8cf0be67d0d2475a246f87cfb8096bc7be0a8839e9d08c538b7a45fd00f82130999407911101a12b4de67177ccf67c9d379dbbccd8bb30eb0b4b277030e003e6592c9c91bfb5af56bc1d6452b9b6483837f2be2dba8c1c01f6543994e62966d385dd7d7d95237d45ac980a607084c3c42008a2d3737f400a6e0343a2a1670b0637f6cea9bfebd7e295d11a55e30bd31d1b25f77e71839f3d9752758e", 0xb0}, {&(0x7f0000004040)="dc", 0x1}], 0x7, &(0x7f0000004100)=[@iv={0x18}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x30, 0x4004040}, {0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000004140)="1618e3afbcb14af9fbc64d5401808a03ced2510f7e5775555dd435e38e8b07291832ddfed69dff77609f", 0x2a}], 0x1, &(0x7f00000041c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x48, 0x117, 0x2, 0x31, "c69ebb8087add88c7c86db3be81532eae37372f836f89e1160b59573232b53e45df0d6dacabfd8046bdbb8d2efe44c92ed"}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x33d2887e}, @assoc={0x18, 0x117, 0x4, 0x1ff}, @op={0x18, 0x117, 0x3, 0x1}], 0x120, 0x4000110}], 0x9, 0x0) fsetxattr$security_smack_transmute(r7, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, 0x0) 02:30:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4020ae46, 0x0) 02:30:53 executing program 4: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 325.342708][T10076] device nr0 entered promiscuous mode 02:30:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:54 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0x4000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = getpid() process_vm_readv(r4, &(0x7f0000000780)=[{&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {0x0}], 0x3, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000074000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r5 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r5, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r6 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r6, 0xc0305602, &(0x7f0000003640)={0x0, 0x83, 0x1007, 0x3}) getpid() pread64(r2, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r7 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r7, &(0x7f0000004300)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="6fcd79c7e16b45503b5ffca1bda99248abba3beef6fb8cede97b625c69a7a72b1aab4f5209f3e282e203daa4c176e9d46a46fd31f9e35b8fb83ac45b55acd3c4f252622fa22ee2dd9db6150513cce522f1ab687f8c4d8f9373d11a076a9f78a64612da9ca0c11e5073b09bb67e89335a5a4b3ef1b3b2", 0x76}], 0x1, &(0x7f0000000400)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x48, 0x40000}, {0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000480)="321f28501bc20c49851b989c9d0c0152df1cc6acbd45a9147610fbd7cd0043c7d289b6631165d5e0d590fd314183d195e32a1f1209c79b68054e85fa699aaa2ce3e88396c9f5957909296d57a6720e5818785558e7954ede29615c52fda0fcf402076c26ddb823b0689d866c900734a83d948b61a724523e41c7fca5d3530cf442312253e8e95ca10b7d5c3345c6", 0x8e}, {&(0x7f0000000880)="17e2394a51115be7a76bb4d0a58d9cb44745ff4a6eed4c535aa83e5a0cbc22bc6a138a56dedd07fa58af17f6cea829b54cf4b280d5e69df41235de7c02a830f421706f790e151a17e55e852edb7163b44fd6f0338d8aa6e5126f74608bf7af2a03dae848ff23b49b3ce7ddf65697d91ba4445623b220826be7a8ce9a60e774756b8b587e617031f72391cedfeee8820dca84c63a5232dbc9d9c22065f9c1371ee32d5490b42f524650c01e5ecb920bce8f544d31b1c75b4144c09834c6ce94becdb06763348d3f69ea585ae62eb7f352b0ac738e68c94112ebc029350ee672159226faa6d35c5dd1cdde28", 0xeb}, {&(0x7f0000000980)="bfef85a3963296518524d8ee125921e9bbe65dde06a569f2f65f65ee5738654be922ab380e8092c438a99ccc0dfb966b112943bb7575b93b661335c5ee8e956bb9c47a13a5d3029818f6f1533c04e04a0b861ff49bdd9a8135effd0618605f0683d5b6975a43e354134b10c8b914e71535bf0afca9b425e0edd587415251fe410cb43dcfbf0a39aa8c34278a77716a28b1e18643bcfc6ac4fa1e0ca9c61e0d11822bf4f4bfb2d9acaf23aad64aa3859b1ef751576f0a720b5d3c6fe9d47d659c0e5c17e1fabbf2df41454faf5b41bdf70e95e3ff5fc79447d2c53bb0c1ba455401b4e71ecb296f7d125b0286f666e88197", 0xf1}, {&(0x7f00000007c0)="6ab9387d3f510dc28e2979d5b9fbcbf5385f7bb331edcffe1fab3ad5d4e90e97ad5dcdfe57d4aad358ad034dcda369f3a7fb3be3fb20ccbd94c947be6462770320a3ce71ed9a06eec9adf88b6e18966a992e996aa3049aa155f5c23da9", 0x5d}, {&(0x7f0000000a80)="bac92540d9dff396278f11d48c3da873dc853a3c8cb34c314bdec0e2f19ab7f0e1ac543e3cbab6c5985fa283c97c05094718a27134477dc69b5f0e20fe77c7c8259ee741a5e4e33e80461a94defed539c492e207b90d54eb25c8c63e06a39c636dcec8f3c3948230052614e8506ecd418afd9418f070ace449607514c71137ff2af9dfa67a7e2d2da6b2d89613b3da392311e716b3b96d094b21a1baca6c403f9c2c99a17536ecd066e54f6a8e6294df97bcec134718142e2887ebb0f49c291f85ed8fcefa82aded5deb3e46a4643d5cc95e2429409c9543071e7b98", 0xdc}], 0x5, &(0x7f0000000c00)=[@iv={0xf0, 0x117, 0x2, 0xdc, "887b4ce67926a4c3813a10150feb92896d1084d85b3024d8936aa0003f90106c8bf63b70e2c20a96e7812c2ff1e60e501bab65b2ce06ef4879ccbaea1caf184678309bf2a1a369b02aaa059dd3c57074708de8d886c4c02fcbb3ad0d387b7f01530885690d6b5430cbc7e4788a6d9b2836ff3796381f436091251afef271165f1318f7b7136c4b85ce4913bc3bf6a75022db3fd45d3c45ec3b49a85a6b77f5b0de82ee78b1ff3547a182c805e1f70963a46bdaa208a59e10db8a7899f797368dd6e235bf623328583224e6be60fff275d948c5200c3774eb816e61df"}, @iv={0x100, 0x117, 0x2, 0xe9, "0ac84950b702e9ab8e24fa0d0b7e23db77ccd0144a32082f1ae24cdc87639d235da6f6ee7b4d56fd4d737c4cf3b81ffac6599bd64f6c6f8d8c44184a297279a4cb06ad61929be9599eae4c666bf577ef8c20bde30a6f026e456cbc6b3bc79f43dc4f7280108526b3f396467024dec3aa5329745167af366db06e8f0c7da1f3693fe65d27eec75071b9ba39cc4377d1a9196bf70d200a6361176e741534554436c16910df2a2c60af55341e62c371cff6519b9fcb44e85f4b0c68c0e4caad1ca2fc8f5f95f699f69be76f05c6ad64b28f982212ca6b3e4d5e4468a0f990cd0795f1a44950bee188ecb8"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x238, 0x8000}, {0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000200)="5d89d4d1dc2f2144027e23b8bafd9b4b4921", 0x12}, {&(0x7f0000000300)="450ba81dba1e474e4277d9bb", 0xc}, {&(0x7f0000000e40)="00b7c186ae0b745ab05b8598779f073ee88c33544c9368cfd1c220d255ddf7d27bde09093690de4ec576c0c370454ea3e88f8b7b647e5a1a3f91f7cdedac8b1020a89790fd67058f0f15538c442e8ba2e1c4f535a033ce765aca8e54f9eeeb7fa41c68347cd74f6a36831eec2905235a390cd3883e340fa668efe214fa49999aa3071b6495526dcec2ae311ca92821ef087e7289156e8237916de7520f76b66d5db8901d91128978371cba5a25669a1d13fe28e4b3e3a0a87bd8d7937d290c4d1984fd692fccf1dcdf89de24e97edebfb77abfe91b3c318c4703f6f60dca38a9f50379c91ff096a8703b8395fe99d37c2c47a716f5", 0xf5}, {&(0x7f0000000380)="316cfcd193eba46bf0ed3c140bc125f9e9", 0x11}, {&(0x7f0000000740)="ea96922a8ff74ef71384eea91a128fadf0aac4eefc", 0x15}, {&(0x7f0000000f40)="ca25dc2defdefa94bed64b59b235e2f213feda2f05c85f6c51953f5caf67b366f3314e6f64", 0x25}, {&(0x7f0000000f80)="e8cff968988345bbeea45ef30b5c6b51d9b7aad89599e4effbfacfa4c5c63a1ce03d0735a81695", 0x27}], 0x7, &(0x7f0000001040)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18, 0x4}, {0x0, 0x0, &(0x7f0000003240)=[{&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000002080)="667ddc7d4fc28de772c3347077e81c7259df", 0x12}, {&(0x7f00000020c0)="54c2d2305a911c405cc09fa37fe181fe950cb77b5936a0d41f836a1e21ae79b4e56b744e5fe0ece733caf185e49f7c387aba4342dd5c6d9053b3be6813702c3ed5579fcf3b17a01419a85c151b0ecd843350858826fddc435b75d19320c8577d58ab3fa52eaca88bbf973a012bb63cecf95dd02a405914b9b30d2bc0f24ae03dd74dd1c71aea66f9afddc396d41d292a80fb321ceff7ef22ba160edcf2e62a63e1e3848bdfd5e8d98f01251ac326f19f84f51685ad5109909038b00fd1406b45818a4ed4f22df3ce", 0xc8}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="2bfa8b5756732ec87bf7d62f580c3d485e44ec3688ee7d502bd0b5c1800f01a58914", 0x22}, {&(0x7f0000003200)="b30854886b84e3e0a9e4169aa61c787ece32", 0x12}], 0x6, &(0x7f00000032c0)=[@assoc={0x18, 0x117, 0x4, 0x401}, @iv={0x30, 0x117, 0x2, 0x1b, "3f19e9568bee51c0e3bf7c69a7ecb6258dec8402603e8fcf247cda"}, @assoc={0x18, 0x117, 0x4, 0x8}, @iv={0xe8, 0x117, 0x2, 0xcf, "bdb2012e80849bed432213ddcc064317f9481f7fde6651b498fafa166cc59b6570047d180c3dd409cee0ed533b2465462647e2a9203aaddb913cbb0233b849ff64e60ccd9f94fe8adb26c6c426c176abdbcfb7cda7c18ac929c4afacae8ec0f009eacc8c9034a8a8b1aba0f202980e3bd41b4fe2b654ef6c3798d1e3b9ad2dc3f967fac7958ff7bacba21557e460b589ed0174fcf837ab6949139d46b4b43986c5aae03e0a81641b6c8c3562b603372a448f34244571786fcff6a5fdae23d2c680d623c6218dadecf45a1cdd8c33c3"}, @iv={0x20, 0x117, 0x2, 0x9, "18d741e7a9b9fcafce"}, @iv={0x100, 0x117, 0x2, 0xea, "c362f0f1b4a7a1547a2a09afc4b4bc903b9c4271db6a6c35c79d1affaba3f5b898aa4dbc8e6de7f51cd1720cd1205bd0355e8bda125de19c7f4e38a73aa764bb2f60caa86049413752f6d5cdf1d85c98e1f408b02a8090f71955474b196cc6618533ff9df6a30f78a5fa76b3783628c43428dce2ae08bbb5f0f1af796e93c8573605798c2d91be729c70341fca1334ec0c423ad5df6eb006212d35f64d4cdd87857510d9632fb62b7fb557dc5d971c8622524468dcf221607e4081eb5eec58d296019468b8085a707cc473ac675ad643d8c3c32d12ac4ece994e7a121603cb828f2f6ed7aa366bad6113"}, @op={0x18}], 0x280}, {0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000003540)="4a5404da07ab68bf972891bb12294b665b653fe3c449f163fa7bb2b9c49d55033b1b0a30bf03183a480bc379720ffb5febe22ce336e9d61e714fedf6f6c15b87eccf320ed88ae7f65ff63e8a8195e8dfc3b32532ee79b01ec295c2b3dfe97d5ce30d1875813880f702ea634f7383fd34023efab2e588943d2dc6c88c53b28116ce4f8a0493f1dadd112e8c56a33413c2563b990c6f304d980b0bf81026346a2f3537d9d0517d46b7eeecac850ff00d234a897142ceabbdf2838369640610f212df91506686863850367c871fea5a6647af84adce7e71d14b3560cae539a689235916e89734", 0xe5}, {&(0x7f0000003640)}], 0x2, &(0x7f00000036c0)=[@assoc={0x18, 0x117, 0x4, 0x79}], 0x18, 0x20010000}, {0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000003700)="5e2c31333e0d799bbd6a55b02f9e2f213c2eb4b964f5adddbc905f3d245b3ce9ac0f1a786a89f4d2a205fd16d530298b66f11f415b03934c5f8d7c3be84105a15c9a06feaab6c0f9e592dd9be3eb1b78647903f6865d93ffcea1dde8447d44b785809de895df6a65c663e93cdee9994110a09d5312c4a95b626e1f2aec8e82a8d8f8f6935d334422ab14bbe45ec5bf53362a1fc0631eccec3af2cb0ca5dcdb4e6abbf7c86c", 0xa5}, {&(0x7f00000037c0)="e14d434a07fb025b0792cfbac45a2e70387ee3c5db573c269010ebf775cd49b49692fb0f5e7dc46b490855848e6269e658f13178109ad3d4db78dce4d4f7fdffddf4d266556dc553378e02f4d96eb78dfd6aa80224ad414768e2a1214fce3caeed718b0a1070750a3d7bb354858276558edfcad4f0b1898d0d95014abbf95d65e61601dc029808a4438353f23c2db7067ef0d396655042408f3273ae71c9db3d83ca3add4fbcbc782562141a104b", 0xae}], 0x2, &(0x7f00000038c0)=[@iv={0xc8, 0x117, 0x2, 0xb0, "28efd165cc68540aa1ef1c2b285f5cf0118fe4a01dc4646132874264e0781dadda34edd45c1ad05c572afff26625e79139e8ed6e8b04dc2c7c3351b672990bb2a5b94dac226939f84a4b152ce2797d4ca18dbb9f018feee5421d589b43a40123338458e668200851f34551305b9bce5749d88b3e658ac3d180090b767a5e1e4ec2df9393bad40de876683f7a15e548d4ac245c2a1074844b152290090bd504f89abf9cfb8b105e53712026a579a9f0b8"}, @assoc={0x18, 0x117, 0x4, 0x1}], 0xe0, 0x80440e2}, {0x0, 0x0, &(0x7f0000003c00)=[{&(0x7f00000039c0)="92c5b0fb3a828cbb62bb2c1a87d4eabd71a85ee84be15e6b47592c0c3112bc88959e0e255476fb611aa55795532889e76aff144e374e58100e948022b9ff4ecdd8bc879d", 0x44}, {&(0x7f0000003a40)="7991af383dceeb2659e469dd8ff3de04c053c57c5c2b5feb775e7fe260d0d33f894909910286e33d2d36494f34ef9ec131b125255fc055de4be3cdc061c1cae64541209e7883c4ac821fff2de0df", 0x4e}, {&(0x7f0000003ac0)="688606741a159ca0b39f7ac6bbe5cb8163375b1e2004c52cb68b36437c148132c9bdda95700742557a6de0f1edb08872c7e5073df186efd072574e1f0bf49d1ba48d5acb23aea0905e245d6fcb0f2e59619cbcd09a3d16c158522d66340fe06dcd5df0126f9c43a52c9e038d0f4f022bd4b1eea03877ba8d2286971651a847e0f3f0bd21f3f68b77badb51610df823a6d429fa4e5c004f6a75072a1835c5ec059e9558ab1bd69edf7549cae83ee9d8e61ea395cbddb25cb4b3eebd649f1855f2bc14022a79", 0xc5}, {&(0x7f0000003bc0)="d7d53d74f44321445086392acdf53b29fa29bac0b08c8fb8afac1dab13d290d3ecd451005dde6f27fe1a7a30", 0x2c}], 0x4, 0x0, 0x0, 0x800}, {0x0, 0x0, &(0x7f0000004080)=[{&(0x7f0000003c40)="af8662068400aa0b071163971ddbbb14faa122835762cb45158f07d8860c00a4d33a0c6813889a54567b9e5096e9e936612d5533f6d2e0bb1d6f38f3ea2d937b6c287456d3ed7f0edf8b1416587153904c", 0x51}, {&(0x7f0000003cc0)="95abbe68ffd0ecfaf3b4b8a39b6dbeec5f8d50a4488c3cb7707c2813a27328a16ad988d8dcbeba12e6d73a33ab2c3c48353ab65a07c499f78b90b11145426b044e1193141c31f164cc09533fcaaf77ad4e6a1b69c10f9cccdcbc34384941a12c769286daaa4bb18b487f1795e211f8d90715886bf7ef7963eaf8e62bd4b7ade92f8afe63b913d536bd885553af689e7c926a3d897dd1c8084e0e37abedaa5d064271d49db9fbd20122884fb5ee7ebc7e3c33304f7d49c7fae0aafdc0ca40369a4353ebd1", 0xc4}, {&(0x7f0000003dc0)="402710b9bfd44e679edf82c2b7bc730eea3957e03f2d1d439d6a996cd8828cc4ee848687aa6713527b92b628be06003cf954abf879c0ad4812cf57b22b90fe8a41f7387e2055b5098a39afc15b09b36f67c0af9a8425ffa41a0a809215d0ff1873faed91a9466c300336dbe1cb2e562b9b03d487c2a672124386", 0x7a}, {&(0x7f0000003e40)="2a7a1be71796844e2cead0c5d071bf33a57b554fd4971982992c4b337de8a7312b1961ca3210cc14a6169e913ee62ec97fd6e9b41957ce19c1b7c2e67a3f8c43f81976117a3ca12e0bc8a76b0a23808adb73ef2697cb8178f9839299caef6b8cf4f3d8f22184d423b18c3fb5b25d48727c2f449dea6172279c0c22514a1ae68d043138855f80c352b3875539c5bc4f8efe3cc1b8b51b53da0424d4a0c9ad78fde1b69dc9ab", 0xa5}, {&(0x7f0000003f00)="f7dcc961497e6bfcab6f6116eee264f7d2652dcdac936699c9794466aac7fda70023b4cd137a63b93cf396a81cb24c78c2783860ed04f5d6ea108cf673c1536dbf3167b8a3a5d5e8916f4fae5ce323f3d69c9f27d61796fe3a674a16c9974ff4ea1ac9e63105359f303e9074596b26", 0x6f}, {&(0x7f0000003f80)="af65718ed9bf03917549038c3bb5f05818abc1ce8cf0be67d0d2475a246f87cfb8096bc7be0a8839e9d08c538b7a45fd00f82130999407911101a12b4de67177ccf67c9d379dbbccd8bb30eb0b4b277030e003e6592c9c91bfb5af56bc1d6452b9b6483837f2be2dba8c1c01f6543994e62966d385dd7d7d95237d45ac980a607084c3c42008a2d3737f400a6e0343a2a1670b0637f6cea9bfebd7e295d11a55e30bd31d1b25f77e71839f3d9752758e", 0xb0}, {&(0x7f0000004040)="dc", 0x1}], 0x7, &(0x7f0000004100)=[@iv={0x18}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x30, 0x4004040}, {0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000004140)="1618e3afbcb14af9fbc64d5401808a03ced2510f7e5775555dd435e38e8b07291832ddfed69dff77609f", 0x2a}], 0x1, &(0x7f00000041c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x48, 0x117, 0x2, 0x31, "c69ebb8087add88c7c86db3be81532eae37372f836f89e1160b59573232b53e45df0d6dacabfd8046bdbb8d2efe44c92ed"}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x33d2887e}, @assoc={0x18, 0x117, 0x4, 0x1ff}, @op={0x18, 0x117, 0x3, 0x1}], 0x120, 0x4000110}], 0x9, 0x0) fsetxattr$security_smack_transmute(r7, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='big_key\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, 0x0) 02:30:54 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 325.573217][T10105] cgroup: fork rejected by pids controller in /syz5 02:30:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 325.938146][T10076] device nr0 entered promiscuous mode 02:30:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4090ae82, 0x0) 02:30:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x301, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:54 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:54 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020181ffffff01000000ff07000000ffffff810008000000000000000040000000486300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget$private(0x0, 0x7, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) semop(r2, &(0x7f0000000240), 0x6) semctl$SETVAL(r2, 0x2, 0x10, &(0x7f0000000040)=0x6) r3 = fcntl$dupfd(r0, 0x80c, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r4, 0x81204101, &(0x7f0000000100)) 02:30:54 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket(0x0, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) r1 = gettid() tkill(r1, 0x1000000000013) r2 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) r4 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) accept4$tipc(r4, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) r5 = geteuid() r6 = getegid() getresuid(0x0, &(0x7f0000000800), 0x0) getresgid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000940)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) fstat(r4, &(0x7f0000000d00)) getuid() getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000200), &(0x7f0000001680)) getresuid(0x0, 0x0, &(0x7f0000001780)) fstat(r3, &(0x7f00000017c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000001900)) gettid() r10 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r10, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x75b30678ba11e8a6, 0x0) r12 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r12, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r14) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x24, 0x1, 0x1, [r10, r11, 0xffffffffffffffff, r12, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r14, r9}}}], 0xc0, 0x4000}, {&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000f40)="62d9b9d62ee09936fce881b2550fdc2981e99c581a741e243d7b763d190c717200238d3de1a1ed4149f4604efd5c917eb4f32db14eb5cfdd73c37282c004d5b3ed9942ee14657bdf6224d8eb6b9958612d3cf0a4c4e3f10922e8c6de354421403c2d01b2b7e6fa53ffa7210c8d0b5bcaa7f376d26f49fcef2357b4d7be156eafb98ffd6f0db38d", 0x87}, {&(0x7f0000001000)="1aafdb0800cb933795b89218e7709e05c70000", 0x13}, {0x0}], 0x3, &(0x7f00000010c0), 0x0, 0x4000004}, {&(0x7f0000001100)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001580), 0x0, 0x0, 0x0, 0x40c4001}, {&(0x7f0000001a80)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001b00), 0x0, 0x0, 0x0, 0x4048850}], 0x4, 0x24000000) getgroups(0x2, &(0x7f00000000c0)=[0x0, 0x0]) r15 = socket$inet6(0xa, 0x400000000001, 0x0) close(r15) r16 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r16, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r16, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r17 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r17, 0x200004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r15, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r15, r17, 0x0, 0x80001d00c0d0) 02:30:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x125d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x800454d2, 0x0) 02:30:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:54 executing program 4: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 326.329764][T10138] loop2: p1 p2 p3 p4 [ 326.329764][T10138] p2: [ 326.351235][T10138] loop2: partition table partially beyond EOD, truncated [ 326.380580][T10138] loop2: p1 start 1 is beyond EOD, truncated [ 326.394676][T10138] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 326.441850][T10138] loop2: p3 size 1912633224 extends beyond EOD, truncated 02:30:55 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x80086301, 0x0) 02:30:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 02:30:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 326.486865][T10138] loop2: p4 size 32768 extends beyond EOD, truncated [ 326.514786][T10138] loop2: p5 start 1 is beyond EOD, truncated 02:30:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x125e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 326.553992][T10138] loop2: p6 size 1073741824 extends beyond EOD, truncated 02:30:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x125f, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:55 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020181ffffff01000000ff07000000ffffff810008000000000000000040000000486300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget$private(0x0, 0x7, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) semop(r2, &(0x7f0000000240), 0x6) semctl$SETVAL(r2, 0x2, 0x10, &(0x7f0000000040)=0x6) r3 = fcntl$dupfd(r0, 0x80c, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r4, 0x81204101, &(0x7f0000000100)) [ 327.207059][T10198] loop2: p1 p2 p3 p4 [ 327.207059][T10198] p2: [ 327.215082][T10198] loop2: partition table partially beyond EOD, truncated [ 327.222333][T10198] loop2: p1 start 1 is beyond EOD, truncated [ 327.228620][T10198] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 327.236509][T10198] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 327.244153][T10198] loop2: p4 size 32768 extends beyond EOD, truncated [ 327.251412][T10198] loop2: p5 start 1 is beyond EOD, truncated [ 327.257499][T10198] loop2: p6 size 1073741824 extends beyond EOD, truncated 02:30:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x42, 0x1, 0x2, 0x0, 0x0}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000040), 0x0}, 0x20) 02:30:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) 02:30:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 02:30:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1260, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090069000007a2e407edab0080582900000046008107a277001419000a0010000000006803f5000000000000ef38bf461e59d7", 0x39}], 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x67da, 0x4000) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0x24, 0xdf, 0x95, 0x52, 0x3d, 0x80, 0x8, 0x1, 0x5, 0xe2, 0x8a, 0x4, 0x55, 0x90}, 0xe) [ 329.325142][T10221] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 329.335963][T10221] team0: Device hsr0 is up. Set it down before adding it as a team port 02:30:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) 02:30:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:58 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) [ 329.376736][T10221] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 329.412458][T10221] team0: Device hsr0 is up. Set it down before adding it as a team port 02:30:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000002b00)="b1", 0x1}], 0x1, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00\x00\x00\x00\x10\x00', 0x10) sendmsg$inet_sctp(r1, &(0x7f00000026c0)={&(0x7f0000000100)=@in={0x2, 0x4e23, @multicast2}, 0x10, 0x0}, 0x8000) splice(r0, 0x0, r1, 0x0, 0x7, 0x0) 02:30:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1261, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:58 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="66ba4100ec0f20e035002000000f22e00f7ef2f2e0000fc77a9d8fe96091ad5200000064f30fc7b70f00000066b83c010f00d0ea7b5549161c00f0312407", 0x125}], 0xabb4cbfa6006e1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x40184152, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:30:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 02:30:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r1 = dup(r0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/61, 0x3d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r3, 0x0) 02:30:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc020660b, 0x0) 02:30:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x7fff, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29, 0xb}], 0x18}], 0x146, 0x0) 02:30:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1262, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:58 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0406429, 0x0) 02:30:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:58 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="66ba4100ec0f20e035002000000f22e00f7ef2f2e0000fc77a9d8fe96091ad5200000064f30fc7b70f00000066b83c010f00d0ea7b5549161c00f0312407", 0x125}], 0xabb4cbfa6006e1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x40184152, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:30:58 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:30:59 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:30:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1263, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x202103, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:30:59 executing program 4: mknod(&(0x7f0000000c40)='./file1\x00', 0x40, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 02:30:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:59 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="66ba4100ec0f20e035002000000f22e00f7ef2f2e0000fc77a9d8fe96091ad5200000064f30fc7b70f00000066b83c010f00d0ea7b5549161c00f0312407", 0x125}], 0xabb4cbfa6006e1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x40184152, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:30:59 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:30:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @raw_data=[0x7f, 0x9, 0xfff, 0x8001, 0x7eed, 0xbd1, 0x2, 0x2, 0x2, 0x2, 0x9b7d, 0x8, 0xfffffe01, 0xc0, 0x3, 0x80e5, 0x12b5b263, 0x55, 0xfffffff8, 0x10000, 0x2, 0x5a, 0x10001, 0x400, 0x9a, 0x2, 0x8, 0x2c2, 0x2, 0x3, 0xdc9, 0x4]}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r3, @ANYBLOB="00002bbd7000fddbdf250f0000000c00090008000100ffffffff840004000c00010073797a310000000044000700060003000200000008000400000000000800040008000000080001001a00005a0800030009000000080004000080000008000300ff00000008000300050000000c0007000800040007000000240007000800020001000000080001001200000017030300080000000800020001000000d39d"], 0xa4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000008) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:30:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1264, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 330.906372][T10327] Unknown ioctl -1072409080 [ 330.922604][T10327] Unknown ioctl -2147201538 [ 330.931262][T10327] Unknown ioctl -1064282524 [ 331.011166][T10338] Unknown ioctl -1064282524 02:30:59 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:30:59 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="66ba4100ec0f20e035002000000f22e00f7ef2f2e0000fc77a9d8fe96091ad5200000064f30fc7b70f00000066b83c010f00d0ea7b5549161c00f0312407", 0x125}], 0xabb4cbfa6006e1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x40184152, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:30:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1265, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:30:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x305, 0x0, 0x0, {{@in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @in6=@rand_addr="29bef66289ecedb14678396a4ed3adba", 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 02:30:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:30:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_elf32(r1, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0xa61) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:00 executing program 4: sched_setscheduler(0x0, 0x6, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) socket$can_j1939(0x1d, 0x2, 0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000040)=0x4, 0x4) 02:31:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000080)=0xc3) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3}, 0x20, 0x1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:00 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1267, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x9}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1b0000001e00030a000000b86726000000000007", @ANYRES32=0x0, @ANYBLOB="1ae1220000000040"], 0x20}}, 0x0) 02:31:00 executing program 4: sched_setscheduler(0x0, 0x6, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x4000000000dc) socket$can_j1939(0x1d, 0x2, 0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000040)=0x4, 0x4) 02:31:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:00 executing program 2: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x638, 0x8085) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/220, 0xdc) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}}) 02:31:00 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:00 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @random, [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 02:31:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1268, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000080)=""/29) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x100, 0x0) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:00 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x1c}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000000)='\f', 0x1}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r1, &(0x7f0000000300)=@abs, &(0x7f0000000280)=0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00'}, 0x30) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x20fe, 0x0) mmap(&(0x7f0000012000/0x1000)=nil, 0x1000, 0x0, 0x12, r4, 0x0) socket(0x17, 0xa, 0x3f) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x1c}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000000)='\f', 0x34000}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 02:31:00 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000100)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 02:31:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1269, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='environ\x00') ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000040)=""/7) 02:31:01 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:01 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$lock(r2, 0x0, &(0x7f0000000040)={0x1, 0x1, 0x7, 0xee38, r4}) 02:31:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1274, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:01 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001e000100000000000000000007000000140000e1ffff09000000b500000000521520602d512699cdc06e5285ecf33d0b0cf369876d7f646837"], 0x28}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="220000002000070700be0000090007010a", 0x11) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 02:31:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 333.008426][T10566] IPVS: ftp: loaded support on port[0] = 21 02:31:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) pipe(&(0x7f0000000200)) socket(0x11, 0x800000003, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x1000032, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 02:31:01 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1276, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:02 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1277, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:02 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 333.868596][T10566] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:31:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1278, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 333.946815][T10566] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:31:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x220200, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) [ 334.106543][T10566] IPVS: ftp: loaded support on port[0] = 21 [ 334.674722][T10928] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. [ 334.684035][T10928] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:31:03 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f0, 0x6d946ea3, 0x0, 0x12, 0x0, 0x1c, "58ae32c83f66fb5f1d1970268727e0b6e5b6584cbc79b6e76de97729e0bcf278ff2e6a5dcddb56c8389c4eae50513b76baf5ab66a935a2d20edc6d56b843a228", "efab06f1a9f3adca6599d58db4c27b75b66a257cf80679dac489f7d416c5a58437411e16aa9548b68770d40278b938e5b5d0ab5c6095abe420c9ff8b5a6edf47", "2637ba6f630f5dd1fcab3a52a36a39cca23e0208feee0af2188dc6a165c2f41c", [0x800, 0x1c0]}) 02:31:03 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1279, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 334.934657][ T21] tipc: TX() has been purged, node left! 02:31:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/r/l\x87\x00', 0x200000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000080)={0x20, "c8f3e74692ca342a08fca7c4ee5095cfac13dbdf9458a0f5bb04d3b40f87e9ae", 0x1, 0x3}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x6, 0xa000}, 0x4) r5 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r5, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r7}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r7, 0x3}}, 0x18) 02:31:03 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001e000100000000000000000007000000140000e1ffff09000000b500000000521520602d512699cdc06e5285ecf33d0b0cf369876d7f646837"], 0x28}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="220000002000070700be0000090007010a", 0x11) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 02:31:03 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 335.087936][T10937] IPVS: ftp: loaded support on port[0] = 21 02:31:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:03 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1f0, 0x6d946ea3, 0x0, 0x12, 0x0, 0x1c, "58ae32c83f66fb5f1d1970268727e0b6e5b6584cbc79b6e76de97729e0bcf278ff2e6a5dcddb56c8389c4eae50513b76baf5ab66a935a2d20edc6d56b843a228", "efab06f1a9f3adca6599d58db4c27b75b66a257cf80679dac489f7d416c5a58437411e16aa9548b68770d40278b938e5b5d0ab5c6095abe420c9ff8b5a6edf47", "2637ba6f630f5dd1fcab3a52a36a39cca23e0208feee0af2188dc6a165c2f41c", [0x800, 0x1c0]}) 02:31:03 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/\xbc\x00', 0x8000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:04 executing program 4: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 02:31:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000000)=0x1) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000500)={'security\x00'}, &(0x7f0000000580)=0x54) 02:31:04 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 335.765836][T11177] Unknown ioctl -1072409080 [ 335.776579][T11177] Unknown ioctl -2147201538 [ 335.814970][T11177] Unknown ioctl 1074025778 [ 335.864343][T11183] Unknown ioctl -1072409080 [ 335.910756][T11185] Unknown ioctl -2147201538 [ 335.941647][T11181] device nr0 entered promiscuous mode [ 336.283298][T11296] device nr0 entered promiscuous mode [ 336.290309][T10937] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.2'. 02:31:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x800000) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xc502, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x5, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) 02:31:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:05 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400, 0x0) sendmmsg$alg(r2, &(0x7f0000002640)=[{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000140)="92a837f5b9c9b4223afeec", 0xb}, {&(0x7f0000000180)="41d9a54076e74244bfebbf130a44da73d39f1f7b8c46381ffcfba1fbc9bdcfeb6aa8d329e9afa0d39c1b9ba552dad695440437c52d797649", 0x38}, {&(0x7f00000001c0)="87d7513e85dccb230c325248c6b4b3f854ac6adeef323343e514a6c919ed731f8b483337b825eadf9ded43476416ac488bdab8393b5d32ab2d1f95edd57bf5657a8edb149afdec071fec4f5193723cd2f12ab506237ef56e421f5fc0744e96137ddc733652072afd7fe6517b6d6bec4ddcb2d02db79fade304fb2f417e3c0cd6b3390d395ff53e65d719de1444588f5c756735f0ff7e626be25c4392f85ea11f02070883c1dc761e2ebd303778fbfb869f8d2c8d7076d3bdf1f5f45371f5a42340d0ed6dec3a7f2969ca9ad417d33b", 0xcf}, {&(0x7f0000000300)="f4bbec5b468a9288376c7623c15a41b1e0b2f10ad944a05766807fa4a4f0ab5d4d3c754804a4937e357bbd586edb335d31ccfd805bc60333fe137a74360fb770ad73afb147596d51df04d4116b46a50c57edc5cb1a08282e9e00bda7de6881b9358654a4af1947ff8f0d8e47a32af7fcbd7b5457b94c115578584138e5a860ed2217ece77e3d1bec9f542d1956b6f2796fd88965a3179256250378249d9b10040dbfea4a4406c2eb6fec4f733fa216711c078395", 0xb4}, {&(0x7f00000003c0)="14f78baec9b9aefb41fabf6933f3cbe2fa9181992ede10b5dd3b493cef7371", 0x1f}, {&(0x7f0000000400)="0ca4a4bb9406a4712139b2ead5f7970ecaed8d0a5a8382d634f1f014e387b85da045a3ec0e268db31dc68d9a7fdfb736a51d55f506dff83c6a4ce6a47cba2c580503a9e74ed02ced687669a72e45357992df5b3421d3d8ae0cb4154bd546b7e07117a0b617fe0788a777081304fdf9ecc8c89cae35fb19cbe5b5885788cf559323c4bfd07e50eae6cbc165eb96956f67befcb949da313f8921f0fc78d902f79f63a9a9e2497cd1d353bf598f7f798bccc19208086d7fb12ba8f3b80a8b6f6e346508e112aa635d585f0bbca8882b39203ff0ec4429e3443bc6e4d42ae1f40532d402fcbcca7ccfaa5765b5412484b402cc07a42f333cd65595bd553b12b8314b25f3d601cf3b6ae45fc7325db691257b7b5b3ab8397079dac32964b069bc48137b35dadbe60d53b08ed39ed419dfb7fadcdc517a9f4833c7131205f37299bdcb7bfdadb26a6e14e93be9ae5287d9febe5164a5c9e956d8afaf45ec88d5ec766cf18edae2d4ae00651e8287d33cca3a0b5166bbc3f7e8eb7474e2f6327dce98cd039c036f53e9efd5b740fb12e91006c10947851a122f319cd8d59aa98bedfbefe662a1aaf4377e7bfe69f5a10b5738725dbb178516a6ad9dd0d31b1f92b2789e4635c917c0dd2c25db593b1178dc4f7208777327b7b6ba4b1d2b25c5d1b7ca39dee6cf54c5e319cb906a94ee71e18313c01ba626b4c6394affae1f025379fc0d4305ec4c8f205fee417c3c9257fe5885793e4a8cf449aa426dc46b49ef0db629f39ff9d6c93d7e38c40e6e6b72552b3563ef757cf157295b3324ca03f32dd643a9a595ff75e043f3304706d1d56c2a3f65a9dcbe6748a95e262a5c201841e00a63f51f3acf8ec7fae96230c27f6dfa40597e993565568434560f976b5bf528da50f553cae9849c083b027d751234053dea5891094f4b265a219de578cd16680cc5b32ed4ea3f1d9a13417dc8efc1668ece4297c27dcce58b2f14b5cbe7c337a98afe722f831e2e5515d9e61f1d8b9e4067e2e4ff13daa812db63b0c3e1cd707337c848f177a19d860c8216bc5a401e8836982fa986046d3bbc8de26df16981e7bd6afeefa385998d0a583d9e7cde45be9f4c0e59cb414c07e2fa86c702c533be8e5a50f4f051a10a4d2a6df375282df619e0e323ba0d79451d9938505f788800375fac3ff8c10280c1e966ee87a72fa24a4dd5c83c4c36d8b18682198a07b84f333bababfad22c0825588713b13ebd5b659eae59ab49688b234e129a7fc881767634597f43b9061308f5e3b04a12ef05b6a170f2121d4baf1b41f6ef0ed000803b980bfc7763346144d0f06c51cbd5ba706a7c182ac3efcce0ffca53b5652d571da9256c707e31040db7e7f29622cf890f46c169176f92a3380b0c64edb558a2dc6a5237e803b05f53d6769ad3e88f7ababce25a20a93e755ba62ca2a9562f05ebd74224e005806ba5b12eeec529dbdea2d5ef159551236a602578d051f47d8cf46963ce37f86727611d0bffa451383c35018108aaab9cbe3573f03eab3f620cdce934a906d4d809afb288aa31e38c491bdd866006320b012fe1ebb96784b573a8379a64e99c3a7754ed18d918e38d318e7dc89ff5a4149acd90a176206867b0fa5f74779629822d9991b984efabfde465ebb04bd76c153a37d2f8d6dd205598ab4ba1e5d356117cf62212cb5b390f652a1757724521c15a8ca1f008ae31d538af90a54ca6f1bdd82e10c249c1afa687d6b6df8bc2f5b28813a42242e7befd1f7f6211abeeb378cea5b5811e98f3f343fb6e74a1830f5ed2fd384e43b13cf4542ee991cd9a3e4451b7d96f1c6310e5fe488399c0f0c690af805a7d16b2fdd266dd15047333c4a638444744955bef35e46ed96877a9df0a428b11e0edcc14c46f047df3f9a94731a8414b2f4b7ec9c898a40c92bbae730f9596921f7913b2ca49b31acd29e6a0bf165a6c806897ad4254bfb69165a636a31c71dbb51a9f4ca11b8bdf71b8f096af62c43a84169f4e5e8191de822f85106ea0c7d2e118fd77ab3544122ba90cdaedd7249dc0807e0dc3a0e68014de32092ec202793c9dd3148943a1d5c35144722ae7b213b4a2476b8c3bd65ee950950f7de12741ab411242261cbb30362245c909ba7ef7546c55d7c4b4c1ef5523c93a62930f9ba48fef98732fdc066bec05b870a2a2eda4a00f86f664bfaa01bb90890a2451812d2481906802a76def0a3e22ca9d66684d13398186e2ad9e7e1be2c667de4450ab324bb492124fc110517a593f5d1901acb4d55b8e7e2ce6d814a2e7bd8d4f6eeed9a1aecfb36fe73073c02edfb446c581e5a3ef916d1ea330627a090b203bd23dd15c143a37be2385c85e0e5e043a7dda5a6bd788d71d0ce71c638c55e4d6b5792f56025a3b6ac58889035e191e52507c13fb89c0c713ca7231dc18db1cb81057280533806cd880e5fe7a6d8183b01b525480614518c06a74b8f6590cf878548ad40aaf1c879b4bd6807a173d1672e0c59aec0f278c086c7c0d8e5b04418d77ce328dab706f0062d5297adab659b6226700c9fffe9e473379b00dc712fd4492f652d1e4bfa6f464f7a8ad4e62393514cbeed427183fb986f9b2fff1abde4289aa35d236a10645be496dcf5b940d94c56f44253ef88d81c3639460d82b3d9668455df0c9afbc68bdb47252e6397466be8a52e987ac173609a7213950dd5f0fc4db34e275556e822217632621424f68806898c192f9a910279a2ea86950e9161a6aa76e2f468c5511059064953596300600f7f91e9afe47fd8136fc13f3b0b172c98fc5c6d274e1e0f359d19c2e36893878eed64888402269e68b351e89f35f6635f2a0227dd1f73222654fa5bcd132fd6b2a236930ad661d7a5b90e9b705e954f9c31297456b9e331588e77c3228df4df74d40514b56f015400733a99db9d2f2bf3b1453429f740a84be2238afc510f8343ebd5e209504deb58db82a2f897ae055dd31fb44d36fefa83e7c09ac29d597f5000d96ea62f59ae213a732eea4a938555fdc996dd493ecaf694cd17bcd2a3a0854e4e72e6f676a7844fc5d0b8af593e30ce2528953852613e64304ed44c75dd714b56957030c013ef9298dff86a014b2b34d53a4486a21781488e8c669ebc3ce4002fdae73732d26a878212285051edfa2a6c8d10ae578704164dcc83a7532576c7f5633f11711426d62dcbd6a09c60ad502107f4763a83244999322c37139c0a1c928f99bddde4f86f2a4899286ac2dc12c7da49b73eea67db9aa070a556568f54cd25e58351165f2a1c399eb393676fd81c1bd23d6d513bb74b52c4ed42547409c5a6b030ae9c37b172f30281a9bcd3feddae5bbe0da5e2fa4f541a26a407b42ed58874d3febfd3799804a39a0a4c983ab7d06eac5cbc45ced5e8ba5c710391e5edb38b4080c9dbd305fcebf60218dda39a38e22d35f1226925e96409ec082b834fb9142da7ed813d7eee22fcd7293a94b576f9dc1566e0d54be9b934b1058d8f146e0250bcdb5d9ecb3255dd23121bf09b2ba163027a0788fb29689439070c92952e008148d99aa91413cd8fe516739e2d5c4b5132f75698fa52c25ea715fcc67fbb98f6efdd7dbadea7d39dedce02fd110b54eace36fb41b273bb99986a426dfc67cec98f424a391ad5ab97c1ef52dbb1f474039296a368ed0fa2324b1244c460901df8dbc6149d9fea88bb50917e762192b62352c4e1220d400632585c5f0a81e874cd95b36ef195cfa2af763038dda32c325805574e4b3cca9298698f10ad4f6d4f6ff05d2f7058b175e97874c4e72a07bacbf8dcac0f6e025dfb7955f4b385a39920089ecca50c1e81121f49eb3b378ce013282bc541c8317b8c7c372a04035b96537a369163f436344cca06f35715f1b7412bb3601ab67815097da8605a737212280a96c9cd69a3c8b1d279c531bb2a5652f2773dcae7f860435d6661ca33ad8d1b652289ff78f2bcc399d24ad1f0b4324b1e7115fc4745469fcad1ce32d8083287cd28ce7d63eac40d878284aefb1d162640935888059e8d0ebd38b7584ee115f527c97cd134c3a03ea2e87275dc5516488c001fadcfcc21ac576abe1105bb5094185b340b6aa67870f5246f16e4cbafa3a7fd9f099206650905f585060398bf937e64816a84cb7e35ffd9572cb911aaacb13c147ac32daeb83dfc7e9a8dda385958308e2f026083f7a85d44d251e151a6d5fb991c0926452529c378b0b3ac50eec2fba56d567bcb75c90461e1e46207e30fcff5775cbe92b5505bfcd10aa142380af7867617a26e27225b4bfa9355af58193cffffb6ddbdb4c9fdfd04eadf57fe3073b4bcb91af5377c97fb17312d7992825607d5d922377dd927516f300314ff166c1fe13ead1269b1d6c2595e896b4501d4b1b9a6cc7f0d04941519cd0bae5f0fdb3c6cabc31e622520d6d4a49a3258ec8e52672407125754afaee221755c062609caee55a35a0f6a6a67cf1c6aa61edb039cf67f164000eb47926b8eb3852ef5e236a9df4d9e36e868c1470a77ac422a21cd7e6a36fdb95834adb7ccd71a8672c5c9a4655be8ff59ac62903d440d9b2e39529b6f08a2dc440767d6bac6aee75a44fd2edbbbc5bb5552a12becf60466461146d227f9043504d9b1a14f23c208403f405e38c2981b2a154316e8b56d4b14b706e478659de77d270ed19e2c85b7e6e5e20c0e37efcd0eb5393491dae2802a05c58cee24a7616ea69bfe72d780f3c923c9fc1c1d6ef174cc7e7760e74430a28686d66943b69002123135db70a175dbdb921b6d6f7e4186c9d5d044235e90d63d9624550c167bc886fb1a8221a5a77b767dcb59e0cabc299f71afa663b06a773c0602339c4324e1289d3fd75ef273479980f0d14323c7837fe69d78a4d9d5c24e7a3c385c5c5b7fafb10028107cd41b96f302321a6590a1caaa7a1cd32f96868273996086f8305a07cd785b8de815e65234cd41d789a800b32e5ca25a7a46e4e94e8f3540b4dba0ea68a4b4ac8982cac77bdbad962ef40e5c067ac2f9d0833454aa037bd78ac607a8bfc0f1211ec57ba2d609550c5d4644c1f950b2ffc35ba37ff1fb22435d09807765fce0f2b9b57bcf631bf8b9aa7065d08880608aba80b3ceab16babec2cf5d61ad8918a32f5f28390c9e78d77ad8eb5e1cc48b7ad8cab2cbcb48f91b24484f83deb0afac218f148aea4f4f5a438313c3ae3c47fbc437fd735c56fd815ea3d38b0eb1b2bb62c6d6972d34bf45f5f4fbb381fbb94293f448095327bd4050286ba899a39926f3d9a10ebb160f56ce718c5684559a6a6959526dfe27095461ba3040bcdbef78d945a05170c94cca9652aab1d6d9d301acb3197358b3e381e864ef931ebd00378960391b832ddcc387ad346221732c60feb3a49835e602ab5f7728ac13c341dd7043490df90f6f54c6e4727a48ed14febc3cfede3e4511f7d8a15dbca8b42761e71da090aedda6f7feb26c319352e2e5690fc6c2a19b04fceeaf5a2771c7a422830ab0042cd3e942c9fcd49088964e85ee34062f2d84f416cee80fea3fbaf10122bfa0a4d7c980e8e822fd78b8609b923c4b94da17d873e6bbb229afc22113c8ff9d6bb77f78746c72c37051f27fa906ec155d5d6d968865e608173ce96d7c6ab86fcfea14b0873b91e6f23188ddc6e7b7ca174723102215d296f8876106874001e4cfd0394807d4009b59b1f0534f9fe35081a653a4658fef778b47f1be38c574e45c9a742a0707597bd4c6209751ea0d5bbea357cb8a292ef75ce572599399350a4aa7aa67f0684bf131d326309661740", 0x1000}, {&(0x7f0000001400)="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", 0x1000}], 0x7, &(0x7f0000002480)=[@iv={0x110, 0x117, 0x2, 0xf5, "12e989516af1d016d06773777c4f92a77e023fe3ab2388ee7771bb30e69cd9c52710533809b385953168a15f1f289332e79ff25af8b3bbbcf2295abeda7550fdc51f62c4f51d1df5c7594210f302402871fdfa68ce220e9ab55bce66412bf00d475dd2f59b2667786a7b288bf47b1b79caffe8161c62b6b6f602f18cc9fa04451ae6593bc9641f9469e991eaee2328cc5e965b0c4271c3883021e6923b9e68d14970edea0fc247f8ff5f7da11766131fae6d3ba494b36d561951770fc62f443caf50d4c806590388615325e70ea1e50d067eadb9328fd28e5f4c0838e1a1c63a9dd8befd5e359ce3f049bec454b3b8a71ae573b590"}, @op={0x18, 0x117, 0x3, 0x87692acaaba6c889}, @iv={0x78, 0x117, 0x2, 0x5d, "ad218a7810db3a2829a5e208f3f5c552880c429009861f2511b203fedd449f28facb2ec17c92b2314622584ed08e0d9c4239e2a1ecd8d2c92d30acb985aa86f074702b749b5f1cf2196f8553f3af81a19745494d00118ece6044efd4a4"}], 0x1a0, 0xc800}], 0x1, 0x20000000) 02:31:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:05 executing program 4: finit_module(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x4) unshare(0x40000000) r0 = dup(0xffffffffffffffff) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'vlan0\x00'}}, 0x1e) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000000c0)=""/59) 02:31:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) [ 336.673564][T11306] IPVS: ftp: loaded support on port[0] = 21 02:31:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0xffffff6a}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) creat(0x0, 0x0) pipe(0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) 02:31:05 executing program 0: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:05 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000)='ocfs2_dlmfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000040)='./file1\x00', 0x0) 02:31:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 337.075462][T11339] IPVS: ftp: loaded support on port[0] = 21 02:31:05 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x6) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, 0x0, &(0x7f0000002000)) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0xf, 0x0, &(0x7f0000002000)) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000040)={r8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000040)={r8, 0x1}, &(0x7f0000000080)=0xfffffff6) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001300)={r5, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}}, 0xfeaf, 0x5}, &(0x7f0000000100)=0x90) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r9, 0x84, 0xf, 0x0, &(0x7f0000002000)) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000040)={r11}, &(0x7f0000000080)=0x8) r12 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0xf, 0x0, &(0x7f0000002000)) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r13, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000010", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r12, 0x84, 0x7b, &(0x7f0000000040)={r14}, &(0x7f0000000080)=0x8) r15 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r15, 0x84, 0xf, 0x0, &(0x7f0000002000)) r16 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r16, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r15, 0x84, 0x7b, &(0x7f0000000040)={r17}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r17, &(0x7f0000000200)=0x4) r18 = creat(&(0x7f0000000000)='./file0\x00', 0x20) recvfrom$ax25(r18, &(0x7f0000000300)=""/4096, 0x1000, 0x2, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast]}, 0x48) r19 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r19, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_SIOCOUTQNSD(r19, 0x894b, &(0x7f00000000c0)) 02:31:05 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 337.176737][ T21] tipc: TX() has been purged, node left! [ 337.201609][ T21] tipc: TX() has been purged, node left! 02:31:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:05 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x240) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nbd(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000440)={'\x00\x11\x00'}, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000180)='netpci0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x1, 0x0, 0x5, 0x7}, {0x3}]}) [ 337.236871][ T21] tipc: TX() has been purged, node left! [ 337.243477][T11530] Unknown ioctl -1072409080 [ 337.257465][T11530] Unknown ioctl -2147201538 [ 337.263016][T11530] Unknown ioctl 1074022656 02:31:05 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:06 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127f, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c00, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:06 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:06 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c01, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:06 executing program 2: 02:31:06 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 339.414592][ T21] tipc: TX() has been purged, node left! 02:31:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:09 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/\x00ev/loOp\xaa\xf4\x9cF\x04\xec\xc6\xd8\x00', 0x400000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x8047) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:09 executing program 2: 02:31:09 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 340.662585][T11840] Unknown ioctl -1072409080 02:31:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="66ba4100ec0f20e035002000000f22e00f7ef2f2e0000fc77a9d8fe96091ad5200000064f30fc7b70f00000066b83c010f00d0ea7b5549161c00f0312407", 0x125}], 0xabb4cbfa6006e1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 340.691668][T11840] Unknown ioctl -2147201538 02:31:09 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c03, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 340.795487][T11851] Unknown ioctl -1072409080 [ 340.819904][T11840] Unknown ioctl -2147201538 02:31:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x116}], 0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/rpc\x00\xb2\xc5\xe6n\xfb\x05^\xa6\x9e=t\xca\x958\xd1\xd0\xa9*\x9a\x97\x8c\xac\xd8\xb2\xf4\x01^\xc4\xc1\xb5p>\xe1\x8f\x9f\xce\r\xa5R\x93\xec\x13\xef\x01b\xed\xc01\x85\xc9\x006\x91\x13\x8d\xad\xec\xdc\x1b\xe6I,l^\x9a\xd415\x89\x9dy\xed\x16\xc437\xe3\xf0\x98BnS\xde\xa7\x89\x92\xea\xcc\x05\xe5\x000\x88\\\xba\x8f\x807\\\x873_0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={r5}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000002a40)={r5, &(0x7f00000029c0)=""/4}) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x8000) r6 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$KVM_GET_DEBUGREGS(r6, 0x8080aea1, &(0x7f0000000080)) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r4, 0x7002) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) r8 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$PPPIOCGFLAGS(r8, 0x8004745a, &(0x7f0000000040)) 02:31:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 356.260064][T12573] Unknown ioctl -1072409080 [ 356.300990][T12573] Unknown ioctl -1072409080 02:31:24 executing program 2: 02:31:24 executing program 0: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 356.330081][T12573] Unknown ioctl -2147201538 [ 356.348136][T12573] Unknown ioctl -2147201538 [ 356.363449][T12573] Unknown ioctl -1072409080 02:31:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x5451, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 356.394462][T12573] Unknown ioctl -2147201538 02:31:25 executing program 2: 02:31:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:27 executing program 0: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x5452, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:27 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000280)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x109000, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:31:27 executing program 2: 02:31:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 359.370519][T12816] Unknown ioctl -1072409080 [ 359.390049][T12816] Unknown ioctl -2147201538 02:31:28 executing program 2: 02:31:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, 0x0) [ 359.430167][T12832] Unknown ioctl -1072409080 [ 359.444369][T12816] Unknown ioctl -2147201538 02:31:28 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x5460, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:28 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000280)) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={r1}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) mq_getsetattr(r2, &(0x7f0000000400)={0xffffffff, 0x3, 0x80000000, 0xffffffffffffffc0}, &(0x7f0000000480)) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000000)={r1, 0x8}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r3, 0x80044dfe, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x32, 0xa6, &(0x7f0000000080)="229a2d06b4527e70f51406b2a5b505607ea9c1dec3a43da2f238a72c87e1b12533363bedfd79f99332f8ddf9138439d11ba7", &(0x7f0000000180)=""/166, 0x1, 0x0, 0xc, 0xb3, &(0x7f0000000100)="dd93efc1c353d72a5eb22c8e", &(0x7f0000000300)="784e3b0205b6309eb5aaee030ba50b33ebf868a33562d98b602e7459d8e98ed7ac4e4f2696d072038f427431777d5e14b617085a2c90d0c26dc91b4379d615ced49efb1ac6f02c24591d1be20e461f62f6a0d18fb4bdfd1dfab1c6b1d93bc635159d8a42091e635cb44e78f2bd325aebe6afef99802a76508fb346d3c8cb455eacd325032556ef447ba148c8b13db246b0060b7c4ff2cf1a936e507f0df10a713248addc37f9738d3f4ec30a60b0f2cd6fecbf"}, 0x40) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) 02:31:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:28 executing program 2: [ 359.629110][T12934] Unknown ioctl -1072409080 [ 359.643452][T12934] Unknown ioctl -2147201538 [ 359.651002][T12934] Unknown ioctl -1072409080 [ 359.656809][T12934] Unknown ioctl -2147201538 [ 359.662402][T12934] Unknown ioctl 1074291754 [ 359.668973][T12934] Unknown ioctl -1072409080 [ 359.674342][T12934] Unknown ioctl -2147201538 [ 359.757797][T12934] Unknown ioctl -1072409080 [ 359.809692][T12940] Unknown ioctl -2147201538 [ 359.810666][T12944] Unknown ioctl -1072409080 [ 359.829202][T12943] Unknown ioctl 1074291754 [ 359.835245][T12943] Unknown ioctl -1072409080 [ 359.840294][T12944] Unknown ioctl -2147201538 [ 359.865159][T12940] Unknown ioctl -2147201538 02:31:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:30 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, 0x0) 02:31:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x6364, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:30 executing program 2: 02:31:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x4b0400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:31 executing program 2: 02:31:31 executing program 3: r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) recvmsg(r0, &(0x7f0000002840)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000002740)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000080)=""/203, 0xcb}, {&(0x7f0000000180)=""/162, 0xa2}, {&(0x7f0000001300)=""/130, 0x82}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/172, 0xac}, {&(0x7f0000002480)=""/238, 0xee}, {&(0x7f0000000240)=""/120, 0x78}, {&(0x7f0000002580)=""/188, 0xbc}, {&(0x7f0000002640)=""/200, 0xc8}], 0xa, &(0x7f0000002800)=""/35, 0x23}, 0x10000) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000002880)=0x4b, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 02:31:31 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, 0x0) 02:31:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x890b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:31 executing program 2: 02:31:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:34 executing program 5: 02:31:34 executing program 2: 02:31:34 executing program 0: 02:31:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x890c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 02:31:34 executing program 0: 02:31:34 executing program 2: 02:31:34 executing program 5: 02:31:34 executing program 2: 02:31:34 executing program 2: 02:31:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x8912, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:37 executing program 5: 02:31:37 executing program 2: 02:31:37 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000280)) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) r1 = socket$inet6(0xa, 0x2, 0x8000040000000088) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000002000)=[{0x10, 0x29}], 0x10}}], 0x2, 0x8000) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x40200, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000)=0x6, 0x1) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) 02:31:37 executing program 0: 02:31:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x8933, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:37 executing program 0: 02:31:37 executing program 2: [ 368.630749][T13236] Unknown ioctl -1072409080 [ 368.636708][T13236] Unknown ioctl -2147201538 [ 368.642456][T13236] Unknown ioctl 1074835010 [ 368.669342][T13236] Unknown ioctl -1072409080 [ 368.675119][T13237] Unknown ioctl -2147201538 02:31:37 executing program 5: [ 368.680528][T13236] Unknown ioctl 1074835010 02:31:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x8946, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:37 executing program 2: 02:31:37 executing program 0: 02:31:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:40 executing program 5: 02:31:40 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000004c0)='@\x00\x00\t\x00', 0x410040, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x7, 'veth0_to_bridge\x00', 0x2}, 0x18) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x82200, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x80000001}, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r2}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f0000000200)=""/112, 0x70}], 0x2, &(0x7f0000000300)=""/126, 0x7e}, 0x20) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@local, 0x4e20, 0x1f, 0x4e22, 0x1e77, 0x2, 0x180, 0x20, 0x2f, r4, r6}, {0x100000001, 0xfffffffffffff800, 0x9, 0x22, 0x0, 0x8, 0x465, 0x3}, {0x1400000000000000, 0x0, 0x9, 0x8}, 0x0, 0x6e6bc0, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4d2, 0x3c}, 0xa, @in=@remote, 0x3507, 0x1, 0x2, 0x0, 0xfffff801, 0x866, 0x9}}, 0xe8) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) sendmmsg$inet(r5, &(0x7f0000000c40)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000500)="613b4a6a26013fe051df58b1376af96a5f8ba7f5da2acc1aef714c72cfc2f53ac7f3a5e3a43a14d460e0ae967deae8bae0da5c4040071062f4bc9338d2584435e545de76f1ad9dadde378d18fd58992984", 0x51}, {&(0x7f0000000580)="fc11f29d21bdc02b33da7fb337e2ae14e0fae523bff42797b272f64bdf0d4dccdd9ad14bffbef8d299fd32efc1b1e95f6d", 0x31}, {&(0x7f00000005c0)="3f1065e624115676f51a59a557890b2c71dffa62cf994d321c9dde0e2fab7f536995d5742f9e1b6d1223b292a7b7fab450d69a488376a8af8e567fa03466df9ae09d34225d8935e172a90ccadafda76d559669a694d3ec5b4d0b5928f6f37860bcce0a52f53123f56e8ab18c261661c1c10ddcfcc7e760a1652ba9eb772ec439575d967fc4e38aa6f2171185f2877ab85c3ec4ee273cbd04fa99e12ba1aa1a79e1241c6ccb7e07d95ac04cae305f8983a8ff46c64c33d97719984c2448faf65d05465bc09f2adcd69c2f6e534b236fd0fb1274b2485b3c8e397d7d58b9ed3d4c", 0xe0}, {&(0x7f00000006c0)="425fc56a2f7ba01a883e841008beadf1ff1c", 0x12}], 0x4, &(0x7f0000000740)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_tos_u8={{0x11}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @multicast2, @broadcast}}}], 0x68}}, {{&(0x7f00000007c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000b40)=[{&(0x7f0000000800)="3372e1bac243680134273146bbec2f78c8ff969ff596e1b4163e89c12bb455e173090685092b059b022a3022c3280165531a858d59c193edb0f1b19cea4ad49818aa136dde00d5362cd9bd8dc08271df05bf60fce3407514dbb3be7de7cea7c00300331f5f6e8e8580eb9778fbfbc86a6e0af3c1bc9db60ae26236f40dad18bc2da32332d9633ec91e1de0c2a65065443dd0255358dedc291e5e94cf872972a089db593494f036ab73aa96e7723c341368f9017e9e0a0a373c", 0xb9}, {&(0x7f00000008c0)="f88057811fb58152d132e76e79e74f92a2b09035041443c58b04dfd88a742f82b7d5a904919ccb61696f60eb525f385c2772fab5a6695c8289f01b1a5b57dcd49cc646d0a8b007f9b767a9c8c13de422018d1837fb504460e4c5bfc879ea7ca88a6edb36105a3fadeeba49f4db3f9cc3b02d0f54adb9d5600c32da917bc47abcf255813b46d874cf297479e68a9d686824bdec4a7ac3c39e31beff60d6", 0x9d}, {&(0x7f0000000980)="d748107cadde94011fa2d500af65fb6940a8bab9b34a263ea3814172ab6939df60f7a84920807e30817dcee89fc910bb99b4c98965448883b35cec11d6a38b604965af44fb5decf39a7af6364006206e139b95707e56aee0d6f2c3ff3fec18330ee4068d44db37a8b01f1192812225b775494b77240c7e9a0cd378a230f749f582e1e93b1b5c5ac03c8af97262a8e054bace9c98cf727ff7e1737f67a2d690fd1b7b6d03a123df2da17953aef353a3f2067040c6e6cf18011f1b197bb623201f54908c36654aed82401696eda1d4254ff514689828e5fba00651f91f4b", 0xdd}, {&(0x7f0000000a80)="3b467abe2279347acb36d6baae096b29464aa6d3510bf8467f59e1f2d433e70be41b7620bc5c7d85e29abf3487077844c907c1d97b437d89970156ec3f3827261e968a2dc3b9cf2f6aa91c439cdc8bfc08625dfb64a60dd7f2156b7fd95065fa056e4de13378b26784889218eb94314be3ba45b5045c5acf330f8fd1eaff84083cbb5c9870b1750e4f647743ebd665142ed6", 0x92}], 0x4, &(0x7f0000000b80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2ed}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x80000}}], 0x90}}], 0x2, 0x8810) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) 02:31:40 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x2000050000}]}) fsetxattr$security_evm(0xffffffffffffff9c, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x7) 02:31:40 executing program 0: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @rand_addr="461d068be5371710040da633890be8b1"}}, 0x5c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 02:31:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x400454ca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:40 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:40 executing program 0: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @rand_addr="461d068be5371710040da633890be8b1"}}, 0x5c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 02:31:40 executing program 3: ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) socketpair(0x5, 0x4, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) pwrite64(r0, &(0x7f0000000040)="7c6721ea33068a936206b5c2d0e5c5904aa910798720ee2162d056dc249f18fa35f3476510663c4b7f84846f0535fb21287ffbbd6ae75032128bdd08ef8c1b4e835805b0ae2922a22fb856e999fd52727000bc624ba162391f04b003b2a43dd1", 0x60, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x2, 0x2}, 0x10) 02:31:40 executing program 2: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @rand_addr="461d068be5371710040da633890be8b1"}}, 0x5c) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 02:31:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40049409, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:40 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:43 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020b0001020000000076f9004000000000"], 0x11}}, 0x0) 02:31:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f000000a000/0x4000)=nil, 0x4000}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 02:31:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40081271, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:43 executing program 3: msgget$private(0x0, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4a0004, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x8, &(0x7f00000000c0)="0805b5055e0bcfe8474071") r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) poll(&(0x7f0000000040)=[{r1, 0x200}, {r2, 0x80}, {0xffffffffffffffff, 0xc9401c38912561f9}, {r3, 0x920}, {r0, 0x20}, {0xffffffffffffffff, 0x1000}, {r4, 0x1}, {0xffffffffffffffff, 0x54}, {r5, 0x20}], 0x9, 0x0) 02:31:43 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40049409, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 375.060147][T13415] kvm: emulating exchange as write 02:31:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x2002, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x82c000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11000100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getroute={0x1c, 0x1a, 0x11, 0x70bd25, 0x25dfdbfc, {0x2, 0x80, 0x54, 0x95, 0xfe, 0x3, 0xff, 0x3, 0x2000}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x28000001}, 0x4000008) restart_syscall() 02:31:43 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40101283, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 02:31:43 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000200)) prctl$PR_SVE_GET_VL(0x33, 0x1b55d) write(0xffffffffffffffff, &(0x7f0000000180)="e61bf460ae8c1c3a09b9327a8c09ecc60f894d40bf5a6d7e51fea113f6f5b6d33ac702a0364497a8e54cc3dc21da4fd0e3e6b814af1a7f5ca1633c45d56b30630f43", 0x42) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 375.445347][T13440] Unknown ioctl -1072409080 [ 375.455864][T13440] Unknown ioctl -2147201538 [ 375.462221][T13440] Unknown ioctl 19585 [ 375.469192][T13440] Unknown ioctl -1072409080 [ 375.475316][T13442] Unknown ioctl -2147201538 02:31:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40049409, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:46 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40101286, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x28500, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40101283, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40101288, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40101286, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 378.082764][T13460] 9pnet: Insufficient options for proto=fd 02:31:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788", 0xfb}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:46 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x220900, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="10002abd7000ffdbdf250100000000000000014100000018001700000015000000047564703a73797a3000000000e0b24cb7c3ca7d2cc9e4830a72332c63b24e460776ba7851101d763bbb98e5e4d225e9104f50b71c60f8b59fff6d2c8f99dcbdffc9be9d8a00a96cf1c061aa2e18cd81bab1d06c580ba4ef86f871f89d67bc74877ee1a10a5cba170280cc73e8085c097c1c40604eb0f73cfa90ac113daf258d1e3ef5d76a0c28fa56d7aa2a8bcc61965e88dc549fadbff578b2df83cdab981066a9005736f659b817d1194c5dfc85d7745583e70b0cc657bfb6"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20200215}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x4, 0x70bd29, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x4) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x10000, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000040)) socket$can_raw(0x1d, 0x3, 0x1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r3, 0x80044dfe, &(0x7f0000000280)) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 02:31:46 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:46 executing program 2: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x401070c9, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 378.335416][T13480] 9pnet: Insufficient options for proto=fd 02:31:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40101286, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:47 executing program 2: remap_file_pages(&(0x7f00002e0000/0x4000)=nil, 0x4000, 0x4, 0x3, 0x18000) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000000c0)={&(0x7f00002df000/0x3000)=nil, 0x3000}) ioctl(r0, 0xffffffffffffffbd, &(0x7f00000000c0)) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) close(0xffffffffffffffff) close(r0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xe3, 0xc000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="1000010e00000000000000000018001700000015000000047564703a73797a3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, r3, 0x8, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1a1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x18001) 02:31:47 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 378.483559][T13493] Unknown ioctl -1072409080 02:31:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x401070ca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 378.521234][T13493] Unknown ioctl -2147201538 [ 378.530326][T13493] Unknown ioctl 16712 02:31:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c09, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 378.592949][T13499] Unknown ioctl -1072409080 [ 378.612855][T13493] Unknown ioctl -2147201538 [ 378.630602][T13499] Unknown ioctl 16712 02:31:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:47 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}}) [ 378.661236][T13503] 9pnet: Insufficient options for proto=fd 02:31:47 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x1000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, 0xffffffffffffffff, 0xc, 0x0, @in6={0xa, 0x4e23, 0x1, @mcast2, 0x1}}}, 0xa0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 378.788620][T13512] 9pnet: Insufficient options for proto=fd 02:31:47 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}}) 02:31:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x401070cd, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 379.025610][T13525] 9pnet: Insufficient options for proto=fd 02:31:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1279, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:50 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x127c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x40186366, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:50 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}}) 02:31:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/\b\x00\x00\x00\x00\x00\x00\x00-contrOL\x00', 0xae29034f342f3557, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:50 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x1, 0x8, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x7}, @random="355cbddb3339", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @remote, @empty, @remote, @remote, @local]}) 02:31:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1279, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 381.545577][T13545] 9pnet: Insufficient options for proto=fd 02:31:50 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl(r0, 0x101, &(0x7f0000000000)="aa67d63a8d7a34ba1f918730e5e28649448187c53cb2bf297138956f987115ebc0ebc5ea492ccd94958d46968f88ab51f5f83a0ee781b7f8d1f4d4d0302d7e255395b1f5aed60d3118506628090147659a325c5e7cbe69b9ae1c41da4667f30967b96066227a4fb9794e4946a01d995ca40370") ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x1279, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 381.820914][T13564] 9pnet: Insufficient options for proto=fd 02:31:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:53 executing program 0 (fault-call:3 fault-nth:0): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x401870c8, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000000)={0x0, @reserved}) r1 = socket(0x10, 0x80002, 0xc) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f0000000200)={0x7ad2490c733a870e, {0x0, 0x7fff, 0x7, 0x7}}) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r4}, {0x8}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:31:53 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:53 executing program 2 (fault-call:10 fault-nth:0): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 384.652877][T13580] 9pnet: Insufficient options for proto=fd [ 384.699716][T13584] FAULT_INJECTION: forcing a failure. [ 384.699716][T13584] name failslab, interval 1, probability 0, space 0, times 0 [ 384.721057][T13581] FAULT_INJECTION: forcing a failure. [ 384.721057][T13581] name failslab, interval 1, probability 0, space 0, times 0 [ 384.736142][T13584] CPU: 1 PID: 13584 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 02:31:53 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 384.744828][T13584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.754980][T13584] Call Trace: [ 384.758273][T13584] dump_stack+0x11d/0x181 [ 384.762612][T13584] should_fail.cold+0xa/0x1a [ 384.767202][T13584] __should_failslab+0xee/0x130 [ 384.772139][T13584] should_failslab+0x9/0x14 [ 384.776662][T13584] __kmalloc+0x53/0x690 [ 384.780814][T13584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.787049][T13584] ? aa_file_perm+0x3a1/0xc20 [ 384.791724][T13584] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 384.797463][T13584] tomoyo_realpath_from_path+0x83/0x4c0 [ 384.802998][T13584] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 384.808476][T13584] tomoyo_check_open_permission+0x201/0x320 [ 384.814386][T13584] tomoyo_file_fcntl+0x96/0xa0 [ 384.819172][T13584] security_file_fcntl+0x6d/0xa0 [ 384.824160][T13584] __x64_sys_fcntl+0xb0/0x160 [ 384.828896][T13584] do_syscall_64+0xcc/0x3a0 [ 384.833436][T13584] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 384.839313][T13584] RIP: 0033:0x45a919 [ 384.843208][T13584] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.862803][T13584] RSP: 002b:00007fab4f4a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 384.871259][T13584] RAX: ffffffffffffffda RBX: 00007fab4f4a0c90 RCX: 000000000045a919 [ 384.879254][T13584] RDX: 0080000000002c00 RSI: 0000000000000004 RDI: 0000000000000003 [ 384.887212][T13584] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 384.895270][T13584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fab4f4a16d4 [ 384.903253][T13584] R13: 00000000004c13f1 R14: 00000000004d5478 R15: 0000000000000004 [ 384.911261][T13581] CPU: 0 PID: 13581 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 384.917920][T13584] ERROR: Out of memory at tomoyo_realpath_from_path. [ 384.919939][T13581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.919945][T13581] Call Trace: [ 384.919971][T13581] dump_stack+0x11d/0x181 [ 384.920003][T13581] should_fail.cold+0xa/0x1a [ 384.948979][T13581] __should_failslab+0xee/0x130 [ 384.953864][T13581] should_failslab+0x9/0x14 [ 384.958407][T13581] __kmalloc+0x53/0x690 [ 384.962560][T13581] ? terminate_walk+0x1d0/0x250 [ 384.967447][T13581] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 384.973347][T13581] tomoyo_realpath_from_path+0x83/0x4c0 [ 384.978923][T13581] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 384.984323][T13581] tomoyo_path_number_perm+0x10a/0x3c0 [ 384.989783][T13581] ? __fget+0xb8/0x1d0 [ 384.993836][T13581] tomoyo_file_ioctl+0x2c/0x40 [ 384.998694][T13581] security_file_ioctl+0x6d/0xa0 [ 385.003638][T13581] ksys_ioctl+0x64/0xe0 [ 385.007803][T13581] __x64_sys_ioctl+0x4c/0x60 [ 385.012429][T13581] do_syscall_64+0xcc/0x3a0 [ 385.016938][T13581] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 385.022829][T13581] RIP: 0033:0x45a919 [ 385.026782][T13581] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.046372][T13581] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 385.054775][T13581] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 385.062741][T13581] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 385.070708][T13581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.078659][T13581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 385.086612][T13581] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 [ 385.096716][T13581] ERROR: Out of memory at tomoyo_realpath_from_path. 02:31:53 executing program 0 (fault-call:3 fault-nth:1): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x401870cb, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:53 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0xb2657e383bd08bf2, 0x1, {0x200}}, 0x18) [ 385.240901][T13595] 9pnet: Insufficient options for proto=fd [ 385.281161][T13602] FAULT_INJECTION: forcing a failure. [ 385.281161][T13602] name failslab, interval 1, probability 0, space 0, times 0 [ 385.293920][T13602] CPU: 0 PID: 13602 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 385.302600][T13602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.312654][T13602] Call Trace: [ 385.315959][T13602] dump_stack+0x11d/0x181 [ 385.320821][T13602] should_fail.cold+0xa/0x1a [ 385.325498][T13602] __should_failslab+0xee/0x130 02:31:53 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 385.330359][T13602] should_failslab+0x9/0x14 [ 385.334936][T13602] __kmalloc+0x53/0x690 [ 385.339163][T13602] ? tomoyo_encode2.part.0+0xd9/0x260 [ 385.344542][T13602] tomoyo_encode2.part.0+0xd9/0x260 [ 385.349854][T13602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.356166][T13602] tomoyo_encode+0x34/0x50 [ 385.360590][T13602] tomoyo_realpath_from_path+0x14a/0x4c0 [ 385.366202][T13602] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 385.371572][T13602] tomoyo_path_number_perm+0x10a/0x3c0 [ 385.377056][T13602] ? __fget+0xb8/0x1d0 [ 385.381172][T13602] tomoyo_file_ioctl+0x2c/0x40 [ 385.386008][T13602] security_file_ioctl+0x6d/0xa0 [ 385.390943][T13602] ksys_ioctl+0x64/0xe0 [ 385.395083][T13602] __x64_sys_ioctl+0x4c/0x60 [ 385.399704][T13602] do_syscall_64+0xcc/0x3a0 [ 385.404196][T13602] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 385.410069][T13602] RIP: 0033:0x45a919 [ 385.413960][T13602] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.433542][T13602] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 385.441946][T13602] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 385.449896][T13602] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 385.457860][T13602] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.465812][T13602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 385.473800][T13602] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:31:54 executing program 0 (fault-call:3 fault-nth:2): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 385.484725][T13602] ERROR: Out of memory at tomoyo_realpath_from_path. [ 385.581555][T13608] 9pnet: Insufficient options for proto=fd [ 385.632414][T13612] FAULT_INJECTION: forcing a failure. [ 385.632414][T13612] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 385.649210][T13612] CPU: 0 PID: 13612 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 385.657913][T13612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.668043][T13612] Call Trace: [ 385.671368][T13612] dump_stack+0x11d/0x181 [ 385.675740][T13612] should_fail.cold+0xa/0x1a [ 385.680356][T13612] should_fail_alloc_page+0x50/0x60 [ 385.685571][T13612] __alloc_pages_nodemask+0xd2/0x310 [ 385.690918][T13612] alloc_pages_current+0xd1/0x170 [ 385.696025][T13612] pte_alloc_one+0x18/0x50 [ 385.700444][T13612] __handle_mm_fault+0x2be6/0x2e00 [ 385.705571][T13612] handle_mm_fault+0x21b/0x530 [ 385.710380][T13612] __do_page_fault+0x456/0x8d0 [ 385.715167][T13612] do_page_fault+0x38/0x194 [ 385.719695][T13612] page_fault+0x34/0x40 [ 385.724020][T13612] RIP: 0010:__get_user_4+0x21/0x30 [ 385.729200][T13612] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 385.748815][T13612] RSP: 0018:ffffc900014abd18 EFLAGS: 00010202 [ 385.754892][T13612] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 385.763048][T13612] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 385.771152][T13612] RBP: ffffc900014abe00 R08: ffff888121e820c0 R09: 000088821a47b018 [ 385.779201][T13612] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 385.787187][T13612] R13: ffff88809f42b200 R14: 000000008004550f R15: ffff88809f42b210 [ 385.795190][T13612] ? usbdev_ioctl+0x1473/0x2130 [ 385.800060][T13612] ? usbdev_ioctl+0x147d/0x2130 [ 385.804935][T13612] ? proc_do_submiturb+0x1f30/0x1f30 [ 385.810285][T13612] do_vfs_ioctl+0x84f/0xcf0 [ 385.814867][T13612] ? tomoyo_file_ioctl+0x34/0x40 [ 385.819877][T13612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.826135][T13612] ksys_ioctl+0xbd/0xe0 [ 385.830310][T13612] __x64_sys_ioctl+0x4c/0x60 [ 385.834945][T13612] do_syscall_64+0xcc/0x3a0 [ 385.839470][T13612] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 385.845428][T13612] RIP: 0033:0x45a919 [ 385.849496][T13612] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.869198][T13612] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 385.877619][T13612] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 385.885600][T13612] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 385.893580][T13612] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.901561][T13612] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 385.909577][T13612] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:31:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x401870cc, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r2, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x1100, 0x0, 'lblc\x00'}, 0x2c) r5 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f00000015c0)) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={r6, @remote, @loopback}, 0xc) ioctl$FICLONE(r2, 0x40049409, r4) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000b00)=ANY=[@ANYBLOB="24010000", @ANYRES16=r7, @ANYBLOB="000426bd7000fedbdf250300000008000100", @ANYRES32, @ANYBLOB="bc00020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r8, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000700000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e670000000000000864561de5000300030000000800040095908b1b3b2e68775a595dbb46029e0efaf72ad80f", @ANYRES32, @ANYBLOB="083900000010", @ANYRES32, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="08000700000000006304ef"], 0xd}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) r10 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) getsockname$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000001000010800"/20, @ANYRES32=r13, @ANYBLOB="00001e00000000000c0001000000000000000000"], 0x2c}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000880)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) r15 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r15, &(0x7f0000000140), 0xffffffffffffff68, 0x0) recvmsg$kcm(r15, &(0x7f0000000640)={&(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000400)=""/188, 0xbc}, {&(0x7f00000004c0)=""/89, 0x59}], 0x2, &(0x7f0000000540)=""/239, 0xef}, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) getsockname$packet(r19, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r21 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r21, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg$nl_route(r17, &(0x7f0000000080)={0x0, 0xf3, &(0x7f0000000040)={&(0x7f0000000800)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC=r21]}}, 0x2000005) accept(0xffffffffffffffff, &(0x7f0000000a40)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000ac0)=0x80) r23 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = dup(r24) getsockname$packet(r25, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r23, &(0x7f0000000080)={0x0, 0x17, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000001000010800"/20, @ANYRES32=r26, @ANYBLOB="0000000001000000"], 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bond_slave_0\x00', 0x0}) r28 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r28, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_SIOCGIFINDEX(r28, 0x8933, &(0x7f0000000cc0)={'bridge_slave_1\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000dc0)={@multicast2, @remote, 0x0}, &(0x7f0000000e00)=0xc) r31 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r33 = dup(r32) getsockname$packet(r33, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r31, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r34, 0x0, 0x80}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) r35 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r37 = dup(r36) getsockname$packet(r37, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r38}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001440)={&(0x7f0000000e40)={0x5d4, r7, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r9}, {0x104, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x401, 0x7f, 0x3, 0x9}, {0xd435, 0x2, 0x7, 0x96d}, {0x0, 0x20, 0x20, 0xd2d}, {0x3, 0x40, 0x20, 0x8001}, {0x80, 0xff, 0x52, 0xffff}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9393a8c}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x7, 0x3, 0x0, 0x200}, {0x7, 0x7, 0x1, 0x9}, {0x4f8b, 0xff, 0x0, 0x6}, {0xfffa, 0x1, 0x5, 0x200}, {0xe7, 0x9, 0x7, 0x8}, {0x80, 0x6, 0x14, 0x1ff}, {0x9, 0x3, 0x8, 0xb0}]}}}]}}, {{0x8, 0x1, r13}, {0x134, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x44, 0x1, @name={{0xffffffffffffffb4, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0xb0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r20}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}]}}, {{0x8, 0x1, r26}, {0x26c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0xffffffffffffff02}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xf47d}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r38}}}]}}]}, 0x5d4}, 0x1, 0x0, 0x0, 0x1}, 0x0) r39 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) r40 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r41 = syz_open_dev$video(0x0, 0x0, 0x0) ioctl$VIDIOC_G_STD(r41, 0x80085617, &(0x7f0000000240)=0x0) ioctl$VIDIOC_S_STD(r40, 0x40085618, &(0x7f00000000c0)=r42) ioctl$VIDIOC_S_STD(r39, 0x40085618, &(0x7f0000000040)=r42) 02:31:56 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 02:31:56 executing program 0 (fault-call:3 fault-nth:3): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:56 executing program 2 (fault-call:10 fault-nth:1): prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 387.813369][T13631] FAULT_INJECTION: forcing a failure. [ 387.813369][T13631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 387.825801][T13629] 9pnet: Insufficient options for proto=fd [ 387.830763][T13631] CPU: 1 PID: 13631 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 387.841166][T13631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.851224][T13631] Call Trace: [ 387.854532][T13631] dump_stack+0x11d/0x181 [ 387.858886][T13631] should_fail.cold+0xa/0x1a [ 387.863487][T13631] should_fail_alloc_page+0x50/0x60 [ 387.868767][T13631] __alloc_pages_nodemask+0xd2/0x310 [ 387.874058][T13631] alloc_pages_current+0xd1/0x170 [ 387.879088][T13631] __page_cache_alloc+0x183/0x1a0 [ 387.884123][T13631] __do_page_cache_readahead+0x13e/0x390 [ 387.889775][T13631] filemap_fault+0xe8b/0x10a0 [ 387.894519][T13631] __do_fault+0xae/0x1f0 [ 387.898827][T13631] __handle_mm_fault+0x270d/0x2e00 [ 387.904086][T13631] handle_mm_fault+0x21b/0x530 [ 387.908897][T13631] __do_page_fault+0x456/0x8d0 02:31:56 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 387.913679][T13631] do_page_fault+0x38/0x194 [ 387.918187][T13631] page_fault+0x34/0x40 [ 387.922413][T13631] RIP: 0010:__get_user_4+0x21/0x30 [ 387.927533][T13631] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 387.948272][T13631] RSP: 0018:ffffc9000190bd18 EFLAGS: 00010202 [ 387.954346][T13631] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 02:31:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 387.962373][T13631] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 387.970348][T13631] RBP: ffffc9000190be00 R08: ffff88809c3f9040 R09: 000088821a47b018 [ 387.978328][T13631] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 387.986305][T13631] R13: ffff8880a3660a00 R14: 000000008004550f R15: ffff8880a3660a10 [ 387.994349][T13631] ? usbdev_ioctl+0x1473/0x2130 [ 387.999290][T13631] ? usbdev_ioctl+0x147d/0x2130 [ 388.004208][T13631] ? proc_do_submiturb+0x1f30/0x1f30 [ 388.009509][T13631] do_vfs_ioctl+0x84f/0xcf0 02:31:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4020940d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 388.014104][T13631] ? tomoyo_file_ioctl+0x34/0x40 [ 388.018940][T13638] 9pnet: Insufficient options for proto=fd [ 388.019052][T13631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.019081][T13631] ksys_ioctl+0xbd/0xe0 [ 388.035307][T13631] __x64_sys_ioctl+0x4c/0x60 [ 388.039922][T13631] do_syscall_64+0xcc/0x3a0 [ 388.044443][T13631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 388.050333][T13631] RIP: 0033:0x45a919 02:31:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 388.054358][T13631] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.074009][T13631] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 388.082461][T13631] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 388.090477][T13631] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 388.098449][T13631] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 388.106422][T13631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 02:31:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:56 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 388.114529][T13631] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:31:56 executing program 0 (fault-call:3 fault-nth:4): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 02:31:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x80041284, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:57 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, 0x0, &(0x7f0000002000)) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000000)={r4, 0xef, "1b161aa04879150b197b99f99284f531c0db1c746cca74eb0884347cef73b2f26d51f2c7f467580947d187be9453e77411a6e0d0db0053e79710e2cd105194010e8d56b093a3ef2de07f32013298038315c8e1e0b5f790e8467bd26f75ff726dad356611cfd6abc268454854d1796c50837c74179b68be899a71e9d5c4d9a506316fcb9ef78729c193690de94f86e1e1fc507e1e1523ff0f0473e73a718c32f1a03bf5b119150c41f005cfccd90badd48c1ea3e4a3e21bb31dcf9ea98f24adc8eead6f7400909da3b7e089e256c1afb476c4b45e41a9c9964278647dd6bb73c8cb589d896b2e5bb45a84787a5a32b8"}, &(0x7f0000000100)=0xf7) 02:31:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 388.595936][T13680] FAULT_INJECTION: forcing a failure. [ 388.595936][T13680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 388.609484][T13680] CPU: 1 PID: 13680 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 388.618159][T13680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.628242][T13680] Call Trace: [ 388.631539][T13680] dump_stack+0x11d/0x181 [ 388.635881][T13680] should_fail.cold+0xa/0x1a [ 388.640491][T13680] should_fail_alloc_page+0x50/0x60 [ 388.645733][T13680] __alloc_pages_nodemask+0xd2/0x310 [ 388.651040][T13680] alloc_pages_current+0xd1/0x170 [ 388.656156][T13680] __page_cache_alloc+0x183/0x1a0 [ 388.661192][T13680] __do_page_cache_readahead+0x13e/0x390 [ 388.666838][T13680] filemap_fault+0xe8b/0x10a0 [ 388.671582][T13680] __do_fault+0xae/0x1f0 [ 388.675841][T13680] __handle_mm_fault+0x270d/0x2e00 [ 388.680975][T13680] handle_mm_fault+0x21b/0x530 [ 388.685827][T13680] __do_page_fault+0x456/0x8d0 [ 388.690608][T13680] do_page_fault+0x38/0x194 02:31:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 388.695152][T13680] page_fault+0x34/0x40 [ 388.699428][T13680] RIP: 0010:__get_user_4+0x21/0x30 [ 388.704548][T13680] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 388.724160][T13680] RSP: 0018:ffffc9000245bd18 EFLAGS: 00010202 [ 388.730327][T13680] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 388.738352][T13680] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 02:31:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 388.746350][T13680] RBP: ffffc9000245be00 R08: ffff88809f4200c0 R09: 000088821a47b018 [ 388.754404][T13680] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 388.762433][T13680] R13: ffff88809c016700 R14: 000000008004550f R15: ffff88809c016710 [ 388.770431][T13680] ? usbdev_ioctl+0x1473/0x2130 [ 388.775389][T13680] ? usbdev_ioctl+0x147d/0x2130 [ 388.780349][T13680] ? proc_do_submiturb+0x1f30/0x1f30 [ 388.785686][T13680] do_vfs_ioctl+0x84f/0xcf0 [ 388.790198][T13680] ? tomoyo_file_ioctl+0x34/0x40 [ 388.795194][T13680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.801493][T13680] ksys_ioctl+0xbd/0xe0 [ 388.805728][T13680] __x64_sys_ioctl+0x4c/0x60 [ 388.810329][T13680] do_syscall_64+0xcc/0x3a0 [ 388.814856][T13680] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 388.820891][T13680] RIP: 0033:0x45a919 [ 388.824898][T13680] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:31:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x80041285, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 388.844500][T13680] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 388.853067][T13680] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 388.861039][T13680] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 388.869183][T13680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 388.877165][T13680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 388.885163][T13680] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:31:59 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)=0x5) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0xeee5c0e12930eabd, &(0x7f0000000040)="46ad757401f1e5fd7efab5c25db8fea4d8f7ba17c58a0dd2feccab4f2e13da2e863ef3fb26e488", 0x27) 02:31:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:31:59 executing program 0 (fault-call:3 fault-nth:5): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:31:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:31:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x2, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x800454d2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:31:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x5, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:31:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 391.335216][T13717] ptrace attach of "/root/syz-executor.4"[13715] was attempted by "/root/syz-executor.4"[13717] [ 391.352941][T13716] FAULT_INJECTION: forcing a failure. [ 391.352941][T13716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 391.389841][T13716] CPU: 1 PID: 13716 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 391.398879][T13716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.408938][T13716] Call Trace: [ 391.412244][T13716] dump_stack+0x11d/0x181 [ 391.416645][T13716] should_fail.cold+0xa/0x1a [ 391.421293][T13716] should_fail_alloc_page+0x50/0x60 [ 391.426575][T13716] __alloc_pages_nodemask+0xd2/0x310 [ 391.431917][T13716] alloc_pages_current+0xd1/0x170 02:32:00 executing program 5: creat(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 391.436954][T13716] __page_cache_alloc+0x183/0x1a0 [ 391.442043][T13716] __do_page_cache_readahead+0x13e/0x390 [ 391.447700][T13716] filemap_fault+0xe8b/0x10a0 [ 391.452400][T13716] __do_fault+0xae/0x1f0 [ 391.456652][T13716] __handle_mm_fault+0x270d/0x2e00 [ 391.461776][T13716] ? __const_udelay+0x36/0x40 [ 391.466551][T13716] handle_mm_fault+0x21b/0x530 [ 391.471433][T13716] __do_page_fault+0x456/0x8d0 [ 391.476205][T13716] do_page_fault+0x38/0x194 [ 391.480693][T13716] page_fault+0x34/0x40 [ 391.484888][T13716] RIP: 0010:__get_user_4+0x21/0x30 [ 391.490036][T13716] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 391.509764][T13716] RSP: 0018:ffffc9000260fd18 EFLAGS: 00010202 [ 391.515811][T13716] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 391.523771][T13716] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 391.531728][T13716] RBP: ffffc9000260fe00 R08: ffff88809f4200c0 R09: 000088821a47b018 [ 391.540101][T13716] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 391.548117][T13716] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 391.556214][T13716] ? usbdev_ioctl+0x1473/0x2130 [ 391.561050][T13716] ? usbdev_ioctl+0x147d/0x2130 [ 391.565886][T13716] ? proc_do_submiturb+0x1f30/0x1f30 [ 391.571155][T13716] do_vfs_ioctl+0x84f/0xcf0 [ 391.575696][T13716] ? tomoyo_file_ioctl+0x34/0x40 [ 391.580708][T13716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 391.586997][T13716] ksys_ioctl+0xbd/0xe0 [ 391.591152][T13716] __x64_sys_ioctl+0x4c/0x60 [ 391.595730][T13716] do_syscall_64+0xcc/0x3a0 [ 391.600221][T13716] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 391.606091][T13716] RIP: 0033:0x45a919 [ 391.609973][T13716] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.630101][T13716] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:32:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) accept4$ax25(r1, &(0x7f0000000040)={{0x3, @default}, [@rose, @null, @netrom, @bcast, @rose, @default, @null, @bcast]}, &(0x7f00000000c0)=0x48, 0x0) 02:32:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x80081270, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 391.638580][T13716] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 391.646682][T13716] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 391.654635][T13716] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 391.662586][T13716] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 391.670538][T13716] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:00 executing program 0 (fault-call:3 fault-nth:6): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, &(0x7f0000000000)=0x1, 0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 391.822023][T13736] ptrace attach of "/root/syz-executor.4"[13735] was attempted by "/root/syz-executor.4"[13736] 02:32:00 executing program 5: creat(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 391.942636][T13746] ptrace attach of "/root/syz-executor.4"[13745] was attempted by "/root/syz-executor.4"[13746] [ 391.989772][T13752] FAULT_INJECTION: forcing a failure. [ 391.989772][T13752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 392.003353][T13752] CPU: 1 PID: 13752 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 392.012032][T13752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.022090][T13752] Call Trace: [ 392.025429][T13752] dump_stack+0x11d/0x181 [ 392.029772][T13752] should_fail.cold+0xa/0x1a [ 392.034372][T13752] should_fail_alloc_page+0x50/0x60 02:32:00 executing program 5: creat(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 392.039656][T13752] __alloc_pages_nodemask+0xd2/0x310 [ 392.045065][T13752] alloc_pages_current+0xd1/0x170 [ 392.050193][T13752] __page_cache_alloc+0x183/0x1a0 [ 392.055229][T13752] __do_page_cache_readahead+0x13e/0x390 [ 392.060892][T13752] filemap_fault+0xe8b/0x10a0 [ 392.065579][T13752] __do_fault+0xae/0x1f0 [ 392.069833][T13752] __handle_mm_fault+0x270d/0x2e00 [ 392.075035][T13752] handle_mm_fault+0x21b/0x530 [ 392.079848][T13752] __do_page_fault+0x456/0x8d0 [ 392.084622][T13752] do_page_fault+0x38/0x194 [ 392.089125][T13752] page_fault+0x34/0x40 [ 392.093271][T13752] RIP: 0010:__get_user_4+0x21/0x30 [ 392.098477][T13752] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 392.118062][T13752] RSP: 0018:ffffc9000293bd18 EFLAGS: 00010202 [ 392.124161][T13752] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 392.132192][T13752] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 392.140150][T13752] RBP: ffffc9000293be00 R08: ffff88809f8cf080 R09: 000088821a47b018 [ 392.148123][T13752] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 392.156128][T13752] R13: ffff88809c016b00 R14: 000000008004550f R15: ffff88809c016b10 [ 392.164094][T13752] ? usbdev_ioctl+0x1473/0x2130 [ 392.169025][T13752] ? usbdev_ioctl+0x147d/0x2130 [ 392.173860][T13752] ? proc_do_submiturb+0x1f30/0x1f30 [ 392.179170][T13752] do_vfs_ioctl+0x84f/0xcf0 [ 392.183660][T13752] ? tomoyo_file_ioctl+0x34/0x40 [ 392.188681][T13752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.194961][T13752] ksys_ioctl+0xbd/0xe0 [ 392.199132][T13752] __x64_sys_ioctl+0x4c/0x60 [ 392.203707][T13752] do_syscall_64+0xcc/0x3a0 [ 392.208251][T13752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 392.214153][T13752] RIP: 0033:0x45a919 [ 392.218041][T13752] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:32:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x80081272, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 392.237641][T13752] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 392.246035][T13752] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 392.254047][T13752] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 392.262144][T13752] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 392.270108][T13752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 392.278136][T13752] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x6, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:02 executing program 0 (fault-call:3 fault-nth:7): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:02 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) timerfd_gettime(r2, &(0x7f0000000000)) 02:32:02 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x80086301, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:03 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 394.434709][T13774] 9pnet: Insufficient options for proto=fd [ 394.461142][T13775] FAULT_INJECTION: forcing a failure. [ 394.461142][T13775] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 394.495405][T13775] CPU: 1 PID: 13775 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 394.504214][T13775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.514271][T13775] Call Trace: [ 394.517568][T13775] dump_stack+0x11d/0x181 [ 394.521924][T13775] should_fail.cold+0xa/0x1a [ 394.526525][T13775] should_fail_alloc_page+0x50/0x60 [ 394.531804][T13775] __alloc_pages_nodemask+0xd2/0x310 [ 394.537161][T13775] alloc_pages_current+0xd1/0x170 02:32:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 394.542240][T13775] __page_cache_alloc+0x183/0x1a0 [ 394.547335][T13775] __do_page_cache_readahead+0x13e/0x390 [ 394.552986][T13775] filemap_fault+0xe8b/0x10a0 [ 394.557675][T13775] __do_fault+0xae/0x1f0 [ 394.561945][T13775] __handle_mm_fault+0x270d/0x2e00 [ 394.567098][T13775] handle_mm_fault+0x21b/0x530 [ 394.571915][T13775] __do_page_fault+0x456/0x8d0 [ 394.576699][T13775] do_page_fault+0x38/0x194 [ 394.581210][T13775] page_fault+0x34/0x40 [ 394.585370][T13775] RIP: 0010:__get_user_4+0x21/0x30 [ 394.590492][T13775] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 394.610247][T13775] RSP: 0018:ffffc90002a83d18 EFLAGS: 00010202 [ 394.616308][T13775] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 394.624274][T13775] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 394.632255][T13775] RBP: ffffc90002a83e00 R08: ffff88809f4200c0 R09: 000088821a47b018 [ 394.640234][T13775] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 394.648304][T13775] R13: ffff88809c016700 R14: 000000008004550f R15: ffff88809c016710 [ 394.656321][T13775] ? usbdev_ioctl+0x1473/0x2130 [ 394.661180][T13775] ? usbdev_ioctl+0x147d/0x2130 [ 394.666139][T13775] ? proc_do_submiturb+0x1f30/0x1f30 [ 394.671548][T13775] do_vfs_ioctl+0x84f/0xcf0 [ 394.676129][T13775] ? tomoyo_file_ioctl+0x34/0x40 [ 394.681090][T13775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.687391][T13775] ksys_ioctl+0xbd/0xe0 [ 394.691576][T13775] __x64_sys_ioctl+0x4c/0x60 [ 394.696185][T13775] do_syscall_64+0xcc/0x3a0 [ 394.700705][T13775] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 394.701097][T13793] 9pnet: Insufficient options for proto=fd [ 394.706639][T13775] RIP: 0033:0x45a919 [ 394.706661][T13775] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 394.706680][T13775] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:32:03 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x8, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 394.744518][T13775] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 394.752555][T13775] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 394.760597][T13775] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 394.768652][T13775] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 394.776699][T13775] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xa4000, 0x0) write$dsp(r1, &(0x7f0000000300)="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", 0x1000) 02:32:03 executing program 0 (fault-call:3 fault-nth:8): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 394.957752][T13806] 9pnet: Insufficient options for proto=fd 02:32:03 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000000008) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 395.121901][T13819] FAULT_INJECTION: forcing a failure. [ 395.121901][T13819] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 395.164643][T13819] CPU: 1 PID: 13819 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 395.173389][T13819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.183457][T13819] Call Trace: [ 395.186759][T13819] dump_stack+0x11d/0x181 [ 395.191179][T13819] should_fail.cold+0xa/0x1a [ 395.195789][T13819] should_fail_alloc_page+0x50/0x60 [ 395.201111][T13819] __alloc_pages_nodemask+0xd2/0x310 [ 395.202295][T13827] 9pnet: Insufficient options for proto=fd [ 395.206435][T13819] alloc_pages_current+0xd1/0x170 [ 395.206533][T13819] __page_cache_alloc+0x183/0x1a0 [ 395.206567][T13819] __do_page_cache_readahead+0x13e/0x390 [ 395.228113][T13819] filemap_fault+0xe8b/0x10a0 [ 395.232867][T13819] __do_fault+0xae/0x1f0 [ 395.237122][T13819] __handle_mm_fault+0x270d/0x2e00 [ 395.242409][T13819] handle_mm_fault+0x21b/0x530 [ 395.247188][T13819] __do_page_fault+0x456/0x8d0 [ 395.251961][T13819] do_page_fault+0x38/0x194 [ 395.256584][T13819] page_fault+0x34/0x40 02:32:03 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 395.260754][T13819] RIP: 0010:__get_user_4+0x21/0x30 [ 395.265905][T13819] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 395.285618][T13819] RSP: 0018:ffffc90002ab3d18 EFLAGS: 00010202 [ 395.291730][T13819] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 395.299745][T13819] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 395.307720][T13819] RBP: ffffc90002ab3e00 R08: ffff88809f8cf080 R09: 000088821a47b018 02:32:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c02) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 395.315696][T13819] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 395.323679][T13819] R13: ffff88809c016b00 R14: 000000008004550f R15: ffff88809c016b10 [ 395.331784][T13819] ? usbdev_ioctl+0x1473/0x2130 [ 395.336728][T13819] ? usbdev_ioctl+0x147d/0x2130 [ 395.341628][T13819] ? proc_do_submiturb+0x1f30/0x1f30 [ 395.346939][T13819] do_vfs_ioctl+0x84f/0xcf0 [ 395.351567][T13819] ? tomoyo_file_ioctl+0x34/0x40 [ 395.356584][T13819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.363004][T13819] ksys_ioctl+0xbd/0xe0 [ 395.368127][T13819] __x64_sys_ioctl+0x4c/0x60 [ 395.372729][T13819] do_syscall_64+0xcc/0x3a0 [ 395.377325][T13819] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 395.383220][T13819] RIP: 0033:0x45a919 [ 395.387236][T13819] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.407001][T13819] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:32:04 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x322, 0x740) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000001c0)={0xb5, "c71fc0c2cc452a92ebf02b3ba60182b409ece4319f856fa0ba77d3d29a5da861e412ffb12176fe870950c75ad48a8d0fd87f07060349430e4273a1627ee93585d6fa1dbb7469137bd798978dc7cb4a6d9deecb19cf8aa9c0f58c9d73252816132044f0c988bd0471d1fd52d66e83a7a9dc47908eedca72b13c0700007759d3fdbcd7f3d200c3b1519cb7c25be49624aa994804740d9ecb168c7675bbdf7dd9cafc9cf21170c536af5ce11d45943974e6833dc51132"}) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc1105511, &(0x7f00000000c0)=0xb) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x368085c94b517b0d) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x4) [ 395.415417][T13819] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 395.423396][T13819] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 395.431372][T13819] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 395.439375][T13819] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 395.448053][T13819] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:04 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 395.499928][T13838] 9pnet: Insufficient options for proto=fd 02:32:04 executing program 0 (fault-call:3 fault-nth:9): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc0101282, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 395.667412][T13852] Unknown ioctl -1072409080 [ 395.675604][T13852] Unknown ioctl -2147201538 [ 395.742529][T13852] Unknown ioctl 44609 [ 395.774294][T13855] 9pnet: Insufficient options for proto=fd [ 395.784476][T13860] FAULT_INJECTION: forcing a failure. [ 395.784476][T13860] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 395.806196][T13860] CPU: 0 PID: 13860 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 02:32:04 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100080, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000080)=0x3) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x1}, 0xb) [ 395.815008][T13860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.825181][T13860] Call Trace: [ 395.828525][T13860] dump_stack+0x11d/0x181 [ 395.832889][T13860] should_fail.cold+0xa/0x1a [ 395.837498][T13860] should_fail_alloc_page+0x50/0x60 [ 395.843059][T13860] __alloc_pages_nodemask+0xd2/0x310 [ 395.848427][T13860] alloc_pages_current+0xd1/0x170 [ 395.853469][T13860] __page_cache_alloc+0x183/0x1a0 [ 395.858520][T13860] __do_page_cache_readahead+0x13e/0x390 [ 395.864179][T13860] filemap_fault+0xe8b/0x10a0 [ 395.876157][T13860] __do_fault+0xae/0x1f0 [ 395.881123][T13860] __handle_mm_fault+0x270d/0x2e00 [ 395.889741][T13860] ? string_nocheck+0xe8/0x100 [ 395.894501][T13860] handle_mm_fault+0x21b/0x530 [ 395.899327][T13860] __do_page_fault+0x456/0x8d0 [ 395.904126][T13860] do_page_fault+0x38/0x194 [ 395.908618][T13860] page_fault+0x34/0x40 [ 395.912759][T13860] RIP: 0010:__get_user_4+0x21/0x30 [ 395.917857][T13860] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 395.937564][T13860] RSP: 0018:ffffc90002fabd18 EFLAGS: 00010202 [ 395.943621][T13860] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 395.951904][T13860] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 395.959867][T13860] RBP: ffffc90002fabe00 R08: ffff888121e97040 R09: 000088821a47b018 [ 395.967823][T13860] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 395.975788][T13860] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 395.984274][T13860] ? usbdev_ioctl+0x1473/0x2130 [ 395.989114][T13860] ? usbdev_ioctl+0x147d/0x2130 [ 395.993953][T13860] ? proc_do_submiturb+0x1f30/0x1f30 [ 395.999346][T13860] do_vfs_ioctl+0x84f/0xcf0 [ 396.003846][T13860] ? tomoyo_file_ioctl+0x34/0x40 [ 396.008848][T13860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.015132][T13860] ksys_ioctl+0xbd/0xe0 [ 396.019329][T13860] __x64_sys_ioctl+0x4c/0x60 [ 396.024005][T13860] do_syscall_64+0xcc/0x3a0 [ 396.028645][T13860] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 396.034538][T13860] RIP: 0033:0x45a919 [ 396.038546][T13860] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.058302][T13860] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.066718][T13860] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 02:32:04 executing program 0 (fault-call:3 fault-nth:10): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 396.074688][T13860] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 396.082667][T13860] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 396.090907][T13860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 396.098868][T13860] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 [ 396.206024][T13869] 9pnet: Insufficient options for proto=fd 02:32:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc0189436, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:04 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 396.271770][T13873] FAULT_INJECTION: forcing a failure. [ 396.271770][T13873] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 396.291182][T13873] CPU: 1 PID: 13873 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 396.299958][T13873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.307248][T13874] Unknown ioctl -1072409080 [ 396.310044][T13873] Call Trace: [ 396.317910][T13873] dump_stack+0x11d/0x181 [ 396.322264][T13873] should_fail.cold+0xa/0x1a [ 396.326867][T13873] should_fail_alloc_page+0x50/0x60 [ 396.330247][T13874] Unknown ioctl -2147201538 [ 396.332073][T13873] __alloc_pages_nodemask+0xd2/0x310 [ 396.332136][T13873] alloc_pages_current+0xd1/0x170 [ 396.346911][T13873] __page_cache_alloc+0x183/0x1a0 [ 396.352741][T13873] __do_page_cache_readahead+0x13e/0x390 [ 396.360344][T13873] filemap_fault+0xe8b/0x10a0 [ 396.365011][T13873] __do_fault+0xae/0x1f0 [ 396.369250][T13873] __handle_mm_fault+0x270d/0x2e00 [ 396.374396][T13873] handle_mm_fault+0x21b/0x530 [ 396.379172][T13873] __do_page_fault+0x456/0x8d0 [ 396.385659][T13873] do_page_fault+0x38/0x194 [ 396.390256][T13873] page_fault+0x34/0x40 [ 396.394409][T13873] RIP: 0010:__get_user_4+0x21/0x30 [ 396.400314][T13873] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 396.421343][T13873] RSP: 0018:ffffc90002953d18 EFLAGS: 00010202 [ 396.427455][T13873] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 396.435414][T13873] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 396.444194][T13873] RBP: ffffc90002953e00 R08: ffff888121e6d080 R09: 000088821a47b018 [ 396.452153][T13873] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 396.460199][T13873] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 396.468285][T13873] ? usbdev_ioctl+0x1473/0x2130 [ 396.474334][T13873] ? usbdev_ioctl+0x147d/0x2130 [ 396.479176][T13873] ? proc_do_submiturb+0x1f30/0x1f30 [ 396.484449][T13873] do_vfs_ioctl+0x84f/0xcf0 [ 396.489003][T13873] ? tomoyo_file_ioctl+0x34/0x40 [ 396.493995][T13873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.500285][T13873] ksys_ioctl+0xbd/0xe0 [ 396.504451][T13873] __x64_sys_ioctl+0x4c/0x60 [ 396.509097][T13873] do_syscall_64+0xcc/0x3a0 [ 396.514599][T13873] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 396.520617][T13873] RIP: 0033:0x45a919 [ 396.524632][T13873] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.544254][T13873] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.552817][T13873] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 396.560776][T13873] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 02:32:05 executing program 0 (fault-call:3 fault-nth:11): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 396.568735][T13873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 396.577454][T13873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 396.585410][T13873] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 [ 396.654243][T13879] Unknown ioctl -2147201538 [ 396.699619][T13882] 9pnet: Insufficient options for proto=fd [ 396.816493][T13886] FAULT_INJECTION: forcing a failure. [ 396.816493][T13886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 396.854135][T13886] CPU: 1 PID: 13886 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 396.862858][T13886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.873200][T13886] Call Trace: [ 396.876646][T13886] dump_stack+0x11d/0x181 [ 396.881359][T13886] should_fail.cold+0xa/0x1a [ 396.886019][T13886] should_fail_alloc_page+0x50/0x60 [ 396.891227][T13886] __alloc_pages_nodemask+0xd2/0x310 [ 396.896553][T13886] alloc_pages_current+0xd1/0x170 [ 396.901592][T13886] __page_cache_alloc+0x183/0x1a0 [ 396.906690][T13886] __do_page_cache_readahead+0x13e/0x390 [ 396.912349][T13886] filemap_fault+0xe8b/0x10a0 [ 396.917044][T13886] __do_fault+0xae/0x1f0 [ 396.921375][T13886] __handle_mm_fault+0x270d/0x2e00 [ 396.926561][T13886] handle_mm_fault+0x21b/0x530 [ 396.931383][T13886] __do_page_fault+0x456/0x8d0 [ 396.936165][T13886] do_page_fault+0x38/0x194 [ 396.940676][T13886] page_fault+0x34/0x40 [ 396.944837][T13886] RIP: 0010:__get_user_4+0x21/0x30 [ 396.950030][T13886] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 396.969973][T13886] RSP: 0018:ffffc90002c43d18 EFLAGS: 00010202 [ 396.976071][T13886] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 396.984054][T13886] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 396.992033][T13886] RBP: ffffc90002c43e00 R08: ffff888121e6d080 R09: 000088821a47b018 [ 397.000018][T13886] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 397.008174][T13886] R13: ffff88809f42b300 R14: 000000008004550f R15: ffff88809f42b310 [ 397.016273][T13886] ? usbdev_ioctl+0x1473/0x2130 [ 397.021117][T13886] ? usbdev_ioctl+0x147d/0x2130 [ 397.026001][T13886] ? proc_do_submiturb+0x1f30/0x1f30 [ 397.031403][T13886] do_vfs_ioctl+0x84f/0xcf0 [ 397.035903][T13886] ? tomoyo_file_ioctl+0x34/0x40 [ 397.041003][T13886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.047332][T13886] ksys_ioctl+0xbd/0xe0 [ 397.051490][T13886] __x64_sys_ioctl+0x4c/0x60 [ 397.056067][T13886] do_syscall_64+0xcc/0x3a0 [ 397.060577][T13886] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 397.067336][T13886] RIP: 0033:0x45a919 [ 397.071229][T13886] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.090832][T13886] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 397.100000][T13886] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 397.108378][T13886] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 397.116401][T13886] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 397.124369][T13886] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 397.132345][T13886] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c04) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:06 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 398.407879][T13895] 9pnet: Insufficient options for proto=fd 02:32:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e4000000290100000001000204000000060000000000000008000000000000008907002e2f66696c6530a602000000010000000000000006000000000000009807002e2f66696c65300802000000080000000000000004000000000000002007002e2f66696c65300900000000000000000000000004000000000000007407002e2f66696c65302204000000070000000000000002000000000000000807002e2f66696c65300000000000080000000000000000010000000000000507002e2f66696c653001000000000300000000001c0040000000000000000807002e2f66696c6530"], 0xe4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:07 executing program 0 (fault-call:3 fault-nth:12): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:07 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002cd4) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 398.711960][T13908] FAULT_INJECTION: forcing a failure. [ 398.711960][T13908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 398.729468][T13907] 9pnet: Insufficient options for proto=fd [ 398.738986][T13908] CPU: 1 PID: 13908 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 398.747686][T13908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.757752][T13908] Call Trace: 02:32:07 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 398.761123][T13908] dump_stack+0x11d/0x181 [ 398.765484][T13908] should_fail.cold+0xa/0x1a [ 398.770110][T13908] should_fail_alloc_page+0x50/0x60 [ 398.775327][T13908] __alloc_pages_nodemask+0xd2/0x310 [ 398.780634][T13908] alloc_pages_current+0xd1/0x170 [ 398.785716][T13908] __page_cache_alloc+0x183/0x1a0 [ 398.790781][T13908] __do_page_cache_readahead+0x13e/0x390 [ 398.796523][T13908] filemap_fault+0xe8b/0x10a0 [ 398.801205][T13908] __do_fault+0xae/0x1f0 [ 398.805488][T13908] __handle_mm_fault+0x270d/0x2e00 [ 398.810977][T13908] handle_mm_fault+0x21b/0x530 [ 398.815908][T13908] __do_page_fault+0x456/0x8d0 [ 398.820734][T13908] do_page_fault+0x38/0x194 [ 398.825224][T13908] page_fault+0x34/0x40 [ 398.829481][T13908] RIP: 0010:__get_user_4+0x21/0x30 [ 398.834607][T13908] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 398.854210][T13908] RSP: 0018:ffffc900031a7d18 EFLAGS: 00010202 [ 398.860339][T13908] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 398.868296][T13908] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 398.876350][T13908] RBP: ffffc900031a7e00 R08: ffff888121e97040 R09: 000088821a47b018 [ 398.884401][T13908] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 398.892431][T13908] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 398.900432][T13908] ? usbdev_ioctl+0x1473/0x2130 [ 398.905358][T13908] ? usbdev_ioctl+0x147d/0x2130 [ 398.910210][T13908] ? proc_do_submiturb+0x1f30/0x1f30 [ 398.915497][T13908] do_vfs_ioctl+0x84f/0xcf0 [ 398.920001][T13908] ? tomoyo_file_ioctl+0x34/0x40 [ 398.925024][T13908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.931251][T13908] ksys_ioctl+0xbd/0xe0 [ 398.935474][T13908] __x64_sys_ioctl+0x4c/0x60 [ 398.940918][T13908] do_syscall_64+0xcc/0x3a0 [ 398.945412][T13908] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 398.951290][T13908] RIP: 0033:0x45a919 [ 398.955190][T13908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 398.975805][T13908] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 398.984261][T13908] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 398.992296][T13908] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 399.000254][T13908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:32:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) r2 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000000c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x7, 0x0, 0xff, 0x1, 0x6, 0x20}, 0x20) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 399.008253][T13908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 399.016279][T13908] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0xffffff7f, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) readahead(r2, 0x6, 0x1) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r4, 0x1, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x800, 0x0, 0x7, 0x8}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) r5 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xff, 0x80800) ioctl$PIO_FONTX(r5, 0x4b6c, 0x0) 02:32:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc0481273, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) [ 399.128140][T13922] 9pnet: Insufficient options for proto=fd 02:32:07 executing program 0 (fault-call:3 fault-nth:13): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 399.282852][T13933] Unknown ioctl -1072409080 [ 399.292065][T13933] Unknown ioctl -2147201538 [ 399.335173][T13933] Unknown ioctl 19586 [ 399.364643][T13936] Unknown ioctl -1072409080 [ 399.370015][T13933] Unknown ioctl -2147201538 [ 399.380357][T13936] Unknown ioctl 19586 [ 399.398343][T13938] FAULT_INJECTION: forcing a failure. [ 399.398343][T13938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 399.413199][T13938] CPU: 0 PID: 13938 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 399.421902][T13938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.431961][T13938] Call Trace: [ 399.435420][T13938] dump_stack+0x11d/0x181 [ 399.439797][T13938] should_fail.cold+0xa/0x1a [ 399.444395][T13938] should_fail_alloc_page+0x50/0x60 [ 399.449735][T13938] __alloc_pages_nodemask+0xd2/0x310 [ 399.455046][T13938] alloc_pages_current+0xd1/0x170 [ 399.460114][T13938] __page_cache_alloc+0x183/0x1a0 [ 399.465161][T13938] __do_page_cache_readahead+0x13e/0x390 [ 399.470861][T13938] filemap_fault+0xe8b/0x10a0 [ 399.475625][T13938] __do_fault+0xae/0x1f0 [ 399.479964][T13938] __handle_mm_fault+0x270d/0x2e00 [ 399.485332][T13938] handle_mm_fault+0x21b/0x530 [ 399.490292][T13938] __do_page_fault+0x456/0x8d0 [ 399.495113][T13938] do_page_fault+0x38/0x194 [ 399.499676][T13938] page_fault+0x34/0x40 [ 399.503824][T13938] RIP: 0010:__get_user_4+0x21/0x30 [ 399.509122][T13938] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 399.528803][T13938] RSP: 0018:ffffc90003463d18 EFLAGS: 00010202 [ 399.534923][T13938] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 399.543052][T13938] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 399.551020][T13938] RBP: ffffc90003463e00 R08: ffff8881267d1000 R09: 000088821a47b018 [ 399.559087][T13938] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 399.567059][T13938] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 399.575127][T13938] ? usbdev_ioctl+0x1473/0x2130 [ 399.580028][T13938] ? usbdev_ioctl+0x147d/0x2130 [ 399.585069][T13938] ? proc_do_submiturb+0x1f30/0x1f30 [ 399.590407][T13938] do_vfs_ioctl+0x84f/0xcf0 [ 399.594904][T13938] ? tomoyo_file_ioctl+0x34/0x40 [ 399.599922][T13938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.606154][T13938] ksys_ioctl+0xbd/0xe0 [ 399.610315][T13938] __x64_sys_ioctl+0x4c/0x60 [ 399.615063][T13938] do_syscall_64+0xcc/0x3a0 [ 399.619564][T13938] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 399.625534][T13938] RIP: 0033:0x45a919 [ 399.629474][T13938] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.649108][T13938] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 399.657629][T13938] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 399.666018][T13938] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 399.674211][T13938] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 399.682186][T13938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 399.690145][T13938] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:10 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000280)=0x41, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) write$eventfd(r2, &(0x7f0000000000)=0x2, 0x8) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x8, @loopback, 0x3ff}, 0x1c) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) socket$inet_smc(0x2b, 0x1, 0x0) r4 = getpid() capset(&(0x7f0000000100)={0x19980330, r4}, &(0x7f0000000180)={0x7, 0xccde4c3, 0x1, 0x80, 0x8, 0x7}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:10 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x44000, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) 02:32:10 executing program 0 (fault-call:3 fault-nth:14): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 401.808781][T13947] Unknown ioctl -1072409080 [ 401.819261][T13951] FAULT_INJECTION: forcing a failure. [ 401.819261][T13951] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 401.843344][T13956] 9pnet: Insufficient options for proto=fd [ 401.845992][T13951] CPU: 0 PID: 13951 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 401.857860][T13951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.867913][T13951] Call Trace: [ 401.871209][T13951] dump_stack+0x11d/0x181 [ 401.875600][T13951] should_fail.cold+0xa/0x1a [ 401.880192][T13951] should_fail_alloc_page+0x50/0x60 [ 401.885434][T13951] __alloc_pages_nodemask+0xd2/0x310 [ 401.890706][T13951] alloc_pages_current+0xd1/0x170 [ 401.895755][T13951] __page_cache_alloc+0x183/0x1a0 [ 401.901132][T13951] __do_page_cache_readahead+0x13e/0x390 [ 401.906754][T13951] filemap_fault+0xe8b/0x10a0 [ 401.911441][T13951] __do_fault+0xae/0x1f0 [ 401.915758][T13951] __handle_mm_fault+0x270d/0x2e00 [ 401.921021][T13951] handle_mm_fault+0x21b/0x530 [ 401.925773][T13951] __do_page_fault+0x456/0x8d0 [ 401.930522][T13951] do_page_fault+0x38/0x194 [ 401.935081][T13951] page_fault+0x34/0x40 [ 401.939298][T13951] RIP: 0010:__get_user_4+0x21/0x30 [ 401.944409][T13951] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 401.964109][T13951] RSP: 0018:ffffc90003543d18 EFLAGS: 00010202 [ 401.970176][T13951] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 401.978192][T13951] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 401.986166][T13951] RBP: ffffc90003543e00 R08: ffff888121e820c0 R09: 000088821a47b018 [ 401.994122][T13951] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 402.002099][T13951] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 402.010067][T13951] ? usbdev_ioctl+0x1473/0x2130 [ 402.014901][T13951] ? usbdev_ioctl+0x147d/0x2130 [ 402.019754][T13951] ? proc_do_submiturb+0x1f30/0x1f30 [ 402.025028][T13951] do_vfs_ioctl+0x84f/0xcf0 [ 402.029524][T13951] ? tomoyo_file_ioctl+0x34/0x40 [ 402.034465][T13951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.040730][T13951] ksys_ioctl+0xbd/0xe0 [ 402.044945][T13951] __x64_sys_ioctl+0x4c/0x60 [ 402.049615][T13951] do_syscall_64+0xcc/0x3a0 [ 402.054108][T13951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 402.059981][T13951] RIP: 0033:0x45a919 [ 402.063952][T13951] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.083567][T13951] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 402.091985][T13951] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 402.100068][T13951] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 02:32:10 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 402.108081][T13951] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 402.116049][T13951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 402.124005][T13951] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:10 executing program 0 (fault-call:3 fault-nth:15): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:10 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) accept4$nfc_llcp(r1, 0x0, &(0x7f0000000100), 0x400) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio1\x00', 0x4300, 0x0) ioctl$SNDCTL_DSP_GETIPTR(r2, 0x800c5011, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000}}, 0x0, 0x5, 0x1f, 0x10001, 0xa9, 0x7, 0x20}, &(0x7f00000000c0)=0x9c) [ 402.263095][T13964] 9pnet: Insufficient options for proto=fd 02:32:10 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 402.356570][T13971] FAULT_INJECTION: forcing a failure. [ 402.356570][T13971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 402.371497][T13971] CPU: 1 PID: 13971 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 402.380184][T13971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.390330][T13971] Call Trace: [ 402.393717][T13971] dump_stack+0x11d/0x181 [ 402.398086][T13971] should_fail.cold+0xa/0x1a [ 402.402756][T13971] should_fail_alloc_page+0x50/0x60 [ 402.408229][T13971] __alloc_pages_nodemask+0xd2/0x310 [ 402.413673][T13971] alloc_pages_current+0xd1/0x170 [ 402.418724][T13971] __page_cache_alloc+0x183/0x1a0 [ 402.423776][T13971] __do_page_cache_readahead+0x13e/0x390 [ 402.429446][T13971] filemap_fault+0xe8b/0x10a0 [ 402.434176][T13971] __do_fault+0xae/0x1f0 [ 402.438532][T13971] __handle_mm_fault+0x270d/0x2e00 [ 402.445219][T13971] handle_mm_fault+0x21b/0x530 [ 402.450015][T13971] __do_page_fault+0x456/0x8d0 02:32:11 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 402.454968][T13971] do_page_fault+0x38/0x194 [ 402.459579][T13971] page_fault+0x34/0x40 [ 402.463737][T13971] RIP: 0010:__get_user_4+0x21/0x30 [ 402.468910][T13971] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 402.488510][T13971] RSP: 0018:ffffc900035dbd18 EFLAGS: 00010202 [ 402.494567][T13971] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 402.502541][T13971] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 402.510520][T13971] RBP: ffffc900035dbe00 R08: ffff888121be80c0 R09: 000088821a47b018 [ 402.518489][T13971] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 402.526482][T13971] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 402.534467][T13971] ? usbdev_ioctl+0x1473/0x2130 [ 402.539323][T13971] ? usbdev_ioctl+0x147d/0x2130 [ 402.544176][T13971] ? proc_do_submiturb+0x1f30/0x1f30 [ 402.549494][T13971] do_vfs_ioctl+0x84f/0xcf0 [ 402.553983][T13971] ? tomoyo_file_ioctl+0x34/0x40 [ 402.558909][T13971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.565340][T13971] ksys_ioctl+0xbd/0xe0 [ 402.570960][T13971] __x64_sys_ioctl+0x4c/0x60 [ 402.575569][T13971] do_syscall_64+0xcc/0x3a0 [ 402.580136][T13971] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 402.586165][T13971] RIP: 0033:0x45a919 [ 402.590047][T13971] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.609637][T13971] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 402.618144][T13971] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 402.626124][T13971] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 402.634078][T13971] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 402.642158][T13971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 402.650114][T13971] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 [ 402.741634][T13981] 9pnet: Insufficient options for proto=fd 02:32:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000080)=""/153, &(0x7f0000000140)=0x99) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:13 executing program 0 (fault-call:3 fault-nth:16): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:13 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x7f, 0x2, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ef13e87960992453d2a3bace4f1b777676c4f28d68ea92fd7792f4ce41540d1ee2c47b99778de033218b31afe60e751e72eaf95ac7a573adbd9a2f8964a12d0ec88a4be5037e17558b3ab9283536346163ecd74a1b6504f3d8a5852480fe7718692f77ad11d6f90d7e3098dab395c45b49ff2cd62788d8949c36f0e997f7cc1a5b5dfa82ca7e79818fff08223fb602907953daa50b446347094a823ef10ec7e79460c329adc97e7d6643d8ef935822485b9fadde6e1463812146286075ef295fccb23ec1e993d0131a1aae4c043ed8f7a010d4c3c16efe980458a294a116879716540f814482ad556226259e4cc9d6a74541", 0xf2, 0x7fff}, {&(0x7f00000001c0)="00a20bed1302ad81310cc1ac5a2412f48a560057ae318ee92e1fa2516266550848af2c0485588cc6ebcc951964519ad43387e911f9f52a50712e34a65c3bed3e473b92439e197f2ec03d60d50a19037b6aba49868de2880e990b5c9c9f5f6e3a6d36b8725c043d9138cf1f1fc8f4644938797e91291b366b631d7d02f1f47f9b0bcf6df6765984d9d06b02ea6bfb1a61d71f0a57", 0x94, 0x9}], 0x140000, &(0x7f00000003c0)=ANY=[@ANYBLOB='disable_sparse=yes,disable_sparse=no,uid=', @ANYRESHEX=r3, @ANYBLOB="2c636173655fa2656e7369746976653d7965732c636173655f73656e7369746976653d7965732c686173682c6673757569643d30360045323407372d656300332d626130542d347537312d36333436393465632c003b81c4fa1e0977bcb71a115b84a78ac8011dd8df0e563fc8895927590e7419ae6472f3c2e7e0a140"]) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 404.935031][T13999] FAULT_INJECTION: forcing a failure. [ 404.935031][T13999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 404.942845][T13998] 9pnet: Insufficient options for proto=fd [ 404.974587][T13999] CPU: 0 PID: 13999 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 404.990583][T13999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.000641][T13999] Call Trace: [ 405.003941][T13999] dump_stack+0x11d/0x181 [ 405.008346][T13999] should_fail.cold+0xa/0x1a [ 405.012945][T13999] should_fail_alloc_page+0x50/0x60 [ 405.018157][T13999] __alloc_pages_nodemask+0xd2/0x310 [ 405.023525][T13999] alloc_pages_current+0xd1/0x170 [ 405.028580][T13999] __page_cache_alloc+0x183/0x1a0 [ 405.035445][T13999] __do_page_cache_readahead+0x13e/0x390 [ 405.041101][T13999] filemap_fault+0xe8b/0x10a0 [ 405.045812][T13999] __do_fault+0xae/0x1f0 [ 405.050186][T13999] __handle_mm_fault+0x270d/0x2e00 [ 405.055347][T13999] handle_mm_fault+0x21b/0x530 [ 405.060171][T13999] __do_page_fault+0x456/0x8d0 [ 405.064956][T13999] do_page_fault+0x38/0x194 [ 405.069476][T13999] page_fault+0x34/0x40 [ 405.073693][T13999] RIP: 0010:__get_user_4+0x21/0x30 [ 405.078829][T13999] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 405.099392][T13999] RSP: 0018:ffffc900036b7d18 EFLAGS: 00010202 [ 405.105500][T13999] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 405.113478][T13999] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 405.121557][T13999] RBP: ffffc900036b7e00 R08: ffff8881267d1000 R09: 000088821a47b018 [ 405.129531][T13999] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 405.137815][T13999] R13: ffff8880a3660d00 R14: 000000008004550f R15: ffff8880a3660d10 [ 405.145837][T13999] ? usbdev_ioctl+0x1473/0x2130 [ 405.150806][T13999] ? usbdev_ioctl+0x147d/0x2130 [ 405.155673][T13999] ? proc_do_submiturb+0x1f30/0x1f30 [ 405.160963][T13999] do_vfs_ioctl+0x84f/0xcf0 [ 405.165530][T13999] ? tomoyo_file_ioctl+0x34/0x40 [ 405.170545][T13999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.177178][T13999] ksys_ioctl+0xbd/0xe0 [ 405.181351][T13999] __x64_sys_ioctl+0x4c/0x60 [ 405.186003][T13999] do_syscall_64+0xcc/0x3a0 [ 405.190529][T13999] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 405.196941][T13999] RIP: 0033:0x45a919 [ 405.200936][T13999] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.220546][T13999] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:32:13 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 405.228965][T13999] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 405.237453][T13999] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 405.245434][T13999] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 405.253963][T13999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 405.261963][T13999] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040)=0x400100000001, 0xfffffffffffffe63) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="c00000000010000001acbfecbb37db82abf610676ebe78ecb3dde50304ccf0a919e3eeebff021f07343a8bbde071b1cefb638bc1e5e9918f1e06c0377f5f95bc28e3fb2012524ecb0f5650d867f8c0f12a20d2533505d0bbc48667e631768d03a9c8743b3d1b64403c7d7e15de9d8b6731457b0c8107024039afd7d9060363a45d80a5d024ddee6669ba2a4e500d1f7dd38b118b7c86c9dac6e7b9c111b40e00e0c371a47e4142a9d1244cd55c8b1c9641dafae52861b44b93547847688f98b9"], 0x30000) tkill(r2, 0x2f) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1000) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x464c9619e2d9311a, &(0x7f0000000000)=""/61, &(0x7f0000000180)=0x3d) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r4) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r5) keyctl$reject(0x13, r4, 0xfffffffffffffffc, 0x8, r5) 02:32:13 executing program 0 (fault-call:3 fault-nth:17): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 405.336280][T14011] 9pnet: Insufficient options for proto=fd 02:32:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 405.494074][T14019] FAULT_INJECTION: forcing a failure. [ 405.494074][T14019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 405.516825][T14019] CPU: 0 PID: 14019 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 405.525658][T14019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.535729][T14019] Call Trace: [ 405.539031][T14019] dump_stack+0x11d/0x181 [ 405.543550][T14019] should_fail.cold+0xa/0x1a [ 405.548152][T14019] should_fail_alloc_page+0x50/0x60 [ 405.553370][T14019] __alloc_pages_nodemask+0xd2/0x310 [ 405.558675][T14019] alloc_pages_current+0xd1/0x170 [ 405.563771][T14019] __page_cache_alloc+0x183/0x1a0 [ 405.568815][T14019] __do_page_cache_readahead+0x13e/0x390 [ 405.574585][T14019] filemap_fault+0xe8b/0x10a0 [ 405.579279][T14019] __do_fault+0xae/0x1f0 [ 405.583607][T14019] __handle_mm_fault+0x270d/0x2e00 [ 405.588797][T14019] handle_mm_fault+0x21b/0x530 [ 405.593619][T14019] __do_page_fault+0x456/0x8d0 [ 405.598399][T14019] do_page_fault+0x38/0x194 [ 405.603025][T14019] page_fault+0x34/0x40 [ 405.607195][T14019] RIP: 0010:__get_user_4+0x21/0x30 [ 405.612322][T14019] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 405.632062][T14019] RSP: 0018:ffffc900036f3d18 EFLAGS: 00010202 [ 405.638766][T14019] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 405.646738][T14019] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 405.654696][T14019] RBP: ffffc900036f3e00 R08: ffff888121be80c0 R09: 000088821a47b018 [ 405.664126][T14019] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 405.672186][T14019] R13: ffff88809f42b100 R14: 000000008004550f R15: ffff88809f42b110 [ 405.680313][T14019] ? usbdev_ioctl+0x1473/0x2130 [ 405.685154][T14019] ? usbdev_ioctl+0x147d/0x2130 [ 405.690007][T14019] ? proc_do_submiturb+0x1f30/0x1f30 [ 405.695329][T14019] do_vfs_ioctl+0x84f/0xcf0 [ 405.699868][T14019] ? tomoyo_file_ioctl+0x34/0x40 [ 405.704801][T14019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.711027][T14019] ksys_ioctl+0xbd/0xe0 [ 405.715186][T14019] __x64_sys_ioctl+0x4c/0x60 [ 405.719843][T14019] do_syscall_64+0xcc/0x3a0 [ 405.724644][T14019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 405.730519][T14019] RIP: 0033:0x45a919 [ 405.734416][T14019] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.755222][T14019] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.763620][T14019] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 405.771575][T14019] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 405.779529][T14019] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 405.787496][T14019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 405.795457][T14019] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:16 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f0000000000), 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e22, 0x6, @ipv4={[], [], @rand_addr=0x800}, 0x10000}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x8}, 0x3, [0x4, 0xea, 0x0, 0x2, 0x0, 0x20, 0xc6, 0x1f]}, 0x5c) getuid() ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='ock\x18^*b\x00\x00\x00\x00\x10\x00', 0x140200, 0x0) ioctl$TCXONC(r3, 0x540a, 0x6) 02:32:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='\x8b6\xd3\x88\x00\x00\xb3\x00', 0x2000, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x400102, 0x60) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x210100, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) r6 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) setsockopt$X25_QBITINCL(r6, 0x106, 0x1, &(0x7f0000000100)=0x1, 0x4) 02:32:16 executing program 0 (fault-call:3 fault-nth:18): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 407.941896][T14037] FAULT_INJECTION: forcing a failure. [ 407.941896][T14037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 407.955398][T14037] CPU: 1 PID: 14037 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 407.963675][T14038] 9pnet: Insufficient options for proto=fd [ 407.964079][T14037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.979979][T14037] Call Trace: [ 407.983278][T14037] dump_stack+0x11d/0x181 02:32:16 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 407.987620][T14037] should_fail.cold+0xa/0x1a [ 407.992905][T14037] should_fail_alloc_page+0x50/0x60 [ 407.998633][T14037] __alloc_pages_nodemask+0xd2/0x310 [ 408.003950][T14037] alloc_pages_current+0xd1/0x170 [ 408.009059][T14037] __page_cache_alloc+0x183/0x1a0 [ 408.014108][T14037] __do_page_cache_readahead+0x13e/0x390 [ 408.019840][T14037] filemap_fault+0xe8b/0x10a0 [ 408.024613][T14037] __do_fault+0xae/0x1f0 [ 408.028938][T14037] __handle_mm_fault+0x270d/0x2e00 [ 408.034131][T14037] handle_mm_fault+0x21b/0x530 [ 408.038895][T14037] __do_page_fault+0x456/0x8d0 [ 408.043647][T14037] do_page_fault+0x38/0x194 [ 408.048643][T14037] page_fault+0x34/0x40 [ 408.052784][T14037] RIP: 0010:__get_user_4+0x21/0x30 [ 408.057884][T14037] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 408.077470][T14037] RSP: 0018:ffffc900044b3d18 EFLAGS: 00010202 [ 408.083566][T14037] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 408.091519][T14037] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 408.099478][T14037] RBP: ffffc900044b3e00 R08: ffff888121be80c0 R09: 000088821a47b018 [ 408.107850][T14037] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 408.115968][T14037] R13: ffff88809f42b200 R14: 000000008004550f R15: ffff88809f42b210 [ 408.123939][T14037] ? usbdev_ioctl+0x1473/0x2130 [ 408.128864][T14037] ? usbdev_ioctl+0x147d/0x2130 [ 408.133715][T14037] ? proc_do_submiturb+0x1f30/0x1f30 [ 408.138993][T14037] do_vfs_ioctl+0x84f/0xcf0 [ 408.143563][T14037] ? tomoyo_file_ioctl+0x34/0x40 [ 408.148534][T14037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.154760][T14037] ksys_ioctl+0xbd/0xe0 [ 408.158900][T14037] __x64_sys_ioctl+0x4c/0x60 [ 408.163513][T14037] do_syscall_64+0xcc/0x3a0 [ 408.168006][T14037] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 408.173929][T14037] RIP: 0033:0x45a919 [ 408.177883][T14037] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.197730][T14037] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 408.206321][T14037] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 408.217464][T14037] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 408.225418][T14037] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 408.233410][T14037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 02:32:16 executing program 0 (fault-call:3 fault-nth:19): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 408.241363][T14037] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:16 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) r4 = socket$inet(0x2, 0xa, 0x3) ioctl$FICLONE(r4, 0x40049409, r2) io_pgetevents(r3, 0x1, 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={0x7}, 0x8}) [ 408.364133][T14046] 9pnet: Insufficient options for proto=fd 02:32:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 408.454690][T14052] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 408.527431][T14061] FAULT_INJECTION: forcing a failure. [ 408.527431][T14061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.541711][T14061] CPU: 0 PID: 14061 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 408.550663][T14061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.560717][T14061] Call Trace: [ 408.564032][T14061] dump_stack+0x11d/0x181 [ 408.569601][T14061] should_fail.cold+0xa/0x1a [ 408.574205][T14061] should_fail_alloc_page+0x50/0x60 [ 408.579467][T14061] __alloc_pages_nodemask+0xd2/0x310 [ 408.584779][T14061] alloc_pages_current+0xd1/0x170 [ 408.589818][T14061] __page_cache_alloc+0x183/0x1a0 [ 408.594901][T14061] __do_page_cache_readahead+0x13e/0x390 [ 408.600545][T14061] filemap_fault+0xe8b/0x10a0 [ 408.605236][T14061] __do_fault+0xae/0x1f0 [ 408.609521][T14061] __handle_mm_fault+0x270d/0x2e00 [ 408.614646][T14061] handle_mm_fault+0x21b/0x530 [ 408.619398][T14061] __do_page_fault+0x456/0x8d0 [ 408.624212][T14061] do_page_fault+0x38/0x194 [ 408.628796][T14061] page_fault+0x34/0x40 [ 408.632943][T14061] RIP: 0010:__get_user_4+0x21/0x30 [ 408.638923][T14061] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 408.658513][T14061] RSP: 0018:ffffc900045b3d18 EFLAGS: 00010202 [ 408.664569][T14061] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 408.672565][T14061] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 408.680954][T14061] RBP: ffffc900045b3e00 R08: ffff8881267d1000 R09: 000088821a47b018 [ 408.689058][T14061] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 408.697647][T14061] R13: ffff88812a111400 R14: 000000008004550f R15: ffff88812a111410 [ 408.705614][T14061] ? usbdev_ioctl+0x1473/0x2130 [ 408.710536][T14061] ? usbdev_ioctl+0x147d/0x2130 [ 408.715404][T14061] ? proc_do_submiturb+0x1f30/0x1f30 [ 408.720687][T14061] do_vfs_ioctl+0x84f/0xcf0 [ 408.725183][T14061] ? tomoyo_file_ioctl+0x34/0x40 [ 408.730220][T14061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.736741][T14061] ksys_ioctl+0xbd/0xe0 [ 408.740925][T14061] __x64_sys_ioctl+0x4c/0x60 [ 408.745562][T14061] do_syscall_64+0xcc/0x3a0 [ 408.750093][T14061] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 408.755986][T14061] RIP: 0033:0x45a919 02:32:17 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 408.759877][T14061] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.779480][T14061] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 408.788029][T14061] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 408.795997][T14061] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 408.803965][T14061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 408.811946][T14061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 408.820011][T14061] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:19 executing program 0 (fault-call:3 fault-nth:20): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:19 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000280)) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:32:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:19 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={0x0, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @l2={0x1f, 0x8000, {0x78, 0x77, 0x2, 0xbe, 0x3, 0x5}, 0x3, 0x8d}, @ethernet={0x6, @random="9b720301fe41"}, 0x2, 0x0, 0x0, 0x0, 0x80, &(0x7f0000000000)='nlmon0\x00', 0x8, 0x7ff, 0x2}) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 411.398495][T14070] FAULT_INJECTION: forcing a failure. [ 411.398495][T14070] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 411.424650][T14070] CPU: 0 PID: 14070 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 411.433387][T14070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.443457][T14070] Call Trace: [ 411.446780][T14070] dump_stack+0x11d/0x181 [ 411.451127][T14070] should_fail.cold+0xa/0x1a [ 411.455732][T14070] should_fail_alloc_page+0x50/0x60 [ 411.460509][T14079] Unknown ioctl -1072409080 [ 411.461036][T14070] __alloc_pages_nodemask+0xd2/0x310 [ 411.461064][T14070] alloc_pages_current+0xd1/0x170 [ 411.475878][T14070] __page_cache_alloc+0x183/0x1a0 [ 411.480936][T14070] __do_page_cache_readahead+0x13e/0x390 [ 411.481115][T14079] Unknown ioctl -2147201538 [ 411.486670][T14070] filemap_fault+0xe8b/0x10a0 [ 411.486695][T14070] __do_fault+0xae/0x1f0 [ 411.486796][T14070] __handle_mm_fault+0x270d/0x2e00 [ 411.486914][T14070] handle_mm_fault+0x21b/0x530 [ 411.501816][T14079] Unknown ioctl 4733 [ 411.505615][T14070] __do_page_fault+0x456/0x8d0 [ 411.505639][T14070] do_page_fault+0x38/0x194 [ 411.505660][T14070] page_fault+0x34/0x40 [ 411.505676][T14070] RIP: 0010:__get_user_4+0x21/0x30 [ 411.505758][T14070] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 411.505777][T14070] RSP: 0018:ffffc90004503d18 EFLAGS: 00010202 [ 411.558693][T14070] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 411.566704][T14070] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 411.574771][T14070] RBP: ffffc90004503e00 R08: ffff88812a201000 R09: 000088821a47b018 [ 411.582749][T14070] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 411.590734][T14070] R13: ffff88812149c500 R14: 000000008004550f R15: ffff88812149c510 02:32:20 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 411.598784][T14070] ? usbdev_ioctl+0x1473/0x2130 [ 411.603741][T14070] ? usbdev_ioctl+0x147d/0x2130 [ 411.608695][T14070] ? proc_do_submiturb+0x1f30/0x1f30 [ 411.613995][T14070] do_vfs_ioctl+0x84f/0xcf0 [ 411.618657][T14070] ? tomoyo_file_ioctl+0x34/0x40 [ 411.623614][T14070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.629930][T14070] ksys_ioctl+0xbd/0xe0 [ 411.634224][T14070] __x64_sys_ioctl+0x4c/0x60 [ 411.638882][T14070] do_syscall_64+0xcc/0x3a0 [ 411.643456][T14070] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 411.649352][T14070] RIP: 0033:0x45a919 [ 411.653263][T14070] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.672978][T14070] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 411.681420][T14070] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 411.689397][T14070] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 411.697379][T14070] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 411.705393][T14070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 411.713472][T14070] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3f1a96f9f1e11b18, &(0x7f0000000280)=0x400100000001, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = creat(&(0x7f0000000000)='./file0\x00', 0xdc) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000040)={0xc025, 0x2}) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0xfffffffffffffff9, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x20, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @rand_addr=0x3}, @in={0x2, 0x4e24, @broadcast}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e20, 0x2, @loopback, 0x5}}}, &(0x7f0000000180)=0x84) tkill(r2, 0x2f) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) fcntl$setstatus(r5, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:20 executing program 0 (fault-call:3 fault-nth:21): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 411.755499][T14079] Unknown ioctl -1072409080 [ 411.771507][T14192] Unknown ioctl -2147201538 [ 411.795198][T14079] Unknown ioctl 4733 02:32:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4200, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:20 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 412.004930][T14210] FAULT_INJECTION: forcing a failure. [ 412.004930][T14210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 412.018799][T14210] CPU: 0 PID: 14210 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 412.027485][T14210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.037580][T14210] Call Trace: [ 412.041014][T14210] dump_stack+0x11d/0x181 [ 412.045373][T14210] should_fail.cold+0xa/0x1a [ 412.050001][T14210] should_fail_alloc_page+0x50/0x60 [ 412.055274][T14210] __alloc_pages_nodemask+0xd2/0x310 [ 412.060650][T14210] alloc_pages_current+0xd1/0x170 [ 412.065685][T14210] __page_cache_alloc+0x183/0x1a0 [ 412.070747][T14210] __do_page_cache_readahead+0x13e/0x390 [ 412.076462][T14210] filemap_fault+0xe8b/0x10a0 [ 412.081239][T14210] __do_fault+0xae/0x1f0 [ 412.085498][T14210] __handle_mm_fault+0x270d/0x2e00 [ 412.090687][T14210] handle_mm_fault+0x21b/0x530 [ 412.095469][T14210] __do_page_fault+0x456/0x8d0 [ 412.100253][T14210] do_page_fault+0x38/0x194 [ 412.104803][T14210] page_fault+0x34/0x40 [ 412.109111][T14210] RIP: 0010:__get_user_4+0x21/0x30 [ 412.114242][T14210] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 412.133844][T14210] RSP: 0018:ffffc90004693d18 EFLAGS: 00010202 [ 412.141456][T14210] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 412.149469][T14210] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 412.157455][T14210] RBP: ffffc90004693e00 R08: ffff88812a201000 R09: 000088821a47b018 [ 412.165416][T14210] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 412.173442][T14210] R13: ffff88812a111400 R14: 000000008004550f R15: ffff88812a111410 [ 412.181491][T14210] ? usbdev_ioctl+0x1473/0x2130 [ 412.186339][T14210] ? usbdev_ioctl+0x147d/0x2130 [ 412.191194][T14210] ? proc_do_submiturb+0x1f30/0x1f30 [ 412.196466][T14210] do_vfs_ioctl+0x84f/0xcf0 [ 412.200955][T14210] ? tomoyo_file_ioctl+0x34/0x40 [ 412.205894][T14210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.240146][T14210] ksys_ioctl+0xbd/0xe0 [ 412.244297][T14210] __x64_sys_ioctl+0x4c/0x60 [ 412.248892][T14210] do_syscall_64+0xcc/0x3a0 [ 412.253388][T14210] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 412.259389][T14210] RIP: 0033:0x45a919 [ 412.263274][T14210] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.282977][T14210] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 412.291894][T14210] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 412.299852][T14210] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 412.307865][T14210] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 412.315833][T14210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 412.323788][T14210] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) fsetxattr(r1, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f0000000040)='\x00', 0x1, 0x2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x200000, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000002c00)='user\x00', &(0x7f0000002c40)={'syz', 0x2}, &(0x7f0000002c80)="9497b0065e0167", 0x7, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000015c0)=[{&(0x7f0000002900)="31cb43f475c2ac516aa9b765d2e5e46ffb272f38300cb0dec4d0a565d5ca809d20cfc8a6515277c48a37dad035a6cbdffb4a4a05140e04f32fa8525fef88c34b846d1ad94439f9230d4012a882d6a562b492d7631afd6ddae2f3d1ca5aa0afa60433f9aa5a3797d4c3171022f375c76f27d9244170b7d1", 0x77}, {&(0x7f0000002980)="17ec6d15938e8e893698a3586baa73fae6a77764cc70a9de076c2106eddc7400d67164d84532ee72a3953056802f553c5132f8a10e84fb9c743461625904bae819bf4c07a137d6bc71beec5ea5e1e66b926486310e5f411ce339af4a8aa53f28b6a804fef99e0ecaf96a0f93f72d4ae7e27b4dc5ca741bb9c096b458968ec67d8d31db3ace7b6ea1d7a95ac14eafbe6e18d099ca6b97fd5140f7cf71ea4819e4fd1e7d812fb546e150741e32569927753e43a6ceb8e61c", 0xb7}, {&(0x7f0000002a40)="21be8d8323d767445e149dab2a8617144e0aa5618d867e9cf7d62fa7c675443aa57709dae0ce64b4cba3ff71e47596c8e1c8ae1769fbd0ea0494af770d95ecad9bceb5fab977871881c791345e85ba35ecd8762db55e8a08df2628021e8da312e618b9e362ec1b6ac0248ec730317db298841f73e830427361e88f53f6590d86654d427db8f352b39b54e4e9d9c05b080f85749914adb10363602131be35eddba938ae0dae591524158e600d5f4dcc657b2aa664cc2ccb3a219b30c7509af0cd2e240270c9784c65fd75fc01c0e4d45c56", 0xd1}, {&(0x7f0000002b40)="ebe7311419f73af6aa83a9df583ef475fa31f78cd139ac0d1d5276a0a1c8bf0d79c7754634f13e60c6d3bbe3c94693b7e70ab697edb91136dee94894e8013ce2d8af85cda7789ecf99502d7ae2bd3a623cb5e25550f24e60720a6abafc52c873849834369aaf12fb9813aec6d592a673e80e61a5b48532d047d53c3eff139340329448bdbe4da68c7ea88bcf43f0cca6d608be7a90a271ac703866e84c", 0x9d}], 0x4, r1) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$xdp(r3, &(0x7f00000028c0)={&(0x7f0000000180)={0x2c, 0x0, r4, 0x28}, 0x10, &(0x7f0000002800)=[{&(0x7f00000002c0)="78a2281f832f034cf74959a70777b24c03d180ebbca510c1b8703e4bddbec6cafd470ed2397fe55c3c902e24712e572374904f71a9cf74aa25e7b41a092827a2ff0495134847c284ffcb3a63d76e3604edfd4b856a796d424f9d93d34b4c399dbf40e8b0a1e3f548dd3e3ce4393eb1f86acb92ae9bd1d2e856a12d28a72e55ee16031fff515b1d7921380e0d651efef8ea0d1a73bb8331314a04d7e13940480513847780a6d795a739bd8527fd92aadb1a3a1f782e96a740515897217f9ff09c59995112fa1bf18f6cfe5e3f96acd9abc1818257a4eb1927c9bd9db14c922c7446d437b06d250469d9d3488443a8e80c94cb", 0xf2}, {&(0x7f00000003c0)="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", 0xff}, {&(0x7f00000001c0)="0fc6451ad8557ccffe52a5ab713f9b643d4476368b6fc287c2705afda1e001db5e80d9189fcf1f1d4aa94103e7c207ff2a0e5f93ea901595db757e1a721517566f955c2c958d42cb54d8ca9f603a87e0cb203b01ac84550eb6de33bd026746c49b865173afe888ce2823ace6311ee44ae2027867863c442b2991e2e37d5329d03e39a8e19da2051824eab5ba3b8b81a96d40d5d55278764753eb952e21a21f5d", 0xa0}, {&(0x7f00000004c0)="01e6a48bb6e39e0fa010ce8ce788e59349003c102bfeab230b1625f973facecb50f8a6a09dd6e9290923fed574d6cf3c85fecfe4c3e0db486afee7587da313c05a3d4630b42cde7d60987037ca9f9a38d8960e3ff7e6a9cd94e1c240ae75ee5e402ec0b1623a975dff77db07eddacd4b6c186aff58e939721dd907e7dbb596db97b62a605ee05cc16cf8bcd190475dde", 0x90}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="3447d6e051450b0f6e2145fa7f63becb64fb0cca07f55f27b796ae34f1269086bd0103cffd", 0x25}, {&(0x7f00000015c0)}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="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", 0xff}, {&(0x7f0000002700)="48f5975d9a56d54a97e6a7e47bf0d61fcc32d0e1bdc123a2232029cc82c103f17dadb1aa8f19dc1839390fc86691b9b3f1747e63e5b46f085fd41b6cef5ee111ab67bf5cbf04d3f0f2b8126e90ff1adc4d746077b778208419ad29fac0879eaa2c6218850cbc419cf083b60ec36a9ae3cf1debfd889d1662685b42da55c5bf94da2311400ff2c9eaa414198f875f306aeb4c4f67cc72aa92b0072efe000baf81417a5bda26eda383799632cdb18c25d3c3156f789b2d6583812836374cc91a9cbf6f59065d20b386e81b", 0xca}], 0xa, 0x0, 0x0, 0x48000}, 0x4000080) tkill(r2, 0x2f) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) r6 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_RCVMTU(r6, 0x112, 0xd, &(0x7f0000002cc0)=0x6, &(0x7f0000002d00)=0x2) ioctl$VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f0000000140)={0xca, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r5, 0x80044dfe, &(0x7f0000000280)) ioctl$SOUND_MIXER_READ_DEVMASK(0xffffffffffffffff, 0x80044dfe, &(0x7f0000000000)) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000f, 0x4, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:23 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:23 executing program 0 (fault-call:3 fault-nth:22): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 414.545417][T14220] FAULT_INJECTION: forcing a failure. [ 414.545417][T14220] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 414.574478][T14220] CPU: 0 PID: 14220 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 414.583199][T14220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.593275][T14220] Call Trace: [ 414.596582][T14220] dump_stack+0x11d/0x181 [ 414.600921][T14220] should_fail.cold+0xa/0x1a [ 414.605505][T14220] should_fail_alloc_page+0x50/0x60 [ 414.610704][T14220] __alloc_pages_nodemask+0xd2/0x310 [ 414.616012][T14220] alloc_pages_current+0xd1/0x170 [ 414.621064][T14220] __page_cache_alloc+0x183/0x1a0 [ 414.626131][T14220] __do_page_cache_readahead+0x13e/0x390 [ 414.631877][T14220] filemap_fault+0xe8b/0x10a0 [ 414.636630][T14220] __do_fault+0xae/0x1f0 [ 414.640880][T14220] __handle_mm_fault+0x270d/0x2e00 [ 414.646038][T14220] handle_mm_fault+0x21b/0x530 [ 414.650842][T14220] __do_page_fault+0x456/0x8d0 [ 414.655602][T14220] do_page_fault+0x38/0x194 [ 414.660091][T14220] page_fault+0x34/0x40 [ 414.664350][T14220] RIP: 0010:__get_user_4+0x21/0x30 [ 414.669450][T14220] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 414.689304][T14220] RSP: 0018:ffffc90004867d18 EFLAGS: 00010202 [ 414.695377][T14220] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 414.703344][T14220] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 414.711327][T14220] RBP: ffffc90004867e00 R08: ffff88812a201000 R09: 000088821a47b018 [ 414.719476][T14220] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 414.727452][T14220] R13: ffff88809f42b100 R14: 000000008004550f R15: ffff88809f42b110 [ 414.735438][T14220] ? usbdev_ioctl+0x1473/0x2130 [ 414.740274][T14220] ? usbdev_ioctl+0x147d/0x2130 [ 414.745147][T14220] ? proc_do_submiturb+0x1f30/0x1f30 [ 414.750496][T14220] do_vfs_ioctl+0x84f/0xcf0 [ 414.754984][T14220] ? tomoyo_file_ioctl+0x34/0x40 [ 414.759918][T14220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.766144][T14220] ksys_ioctl+0xbd/0xe0 [ 414.770302][T14220] __x64_sys_ioctl+0x4c/0x60 [ 414.774991][T14220] do_syscall_64+0xcc/0x3a0 [ 414.779489][T14220] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 414.785365][T14220] RIP: 0033:0x45a919 [ 414.789401][T14220] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 414.808988][T14220] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 414.817381][T14220] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 414.825334][T14220] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 414.833287][T14220] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:32:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000180)="f3302023ae5457ac1aab45070cfaf79d341935bfaf296d8505a77d1cbb2e11b31b41953efe20dbe08c967dbee099ee29008c25ea2c6dfe3530707a44b6b04ba61de58ce0c074dd9ec986045cd42e2cf09f7ffded7e8f036066e0610876f30c7171f9873c316cf8d154867c1fbb8a4cb2b302392ce69be25782b7b2b7c96459dde888cdf92b2bcde82652072477ab022d62a75dfc8c96b6179ad8a6d25cf9d11396bdd9dae9525a2d54a5b551c04a3822b58d0c5f55ba1c9587295f41", 0xbc) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x120000, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000040)=0x1f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:23 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 414.841257][T14220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 414.849213][T14220] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:23 executing program 0 (fault-call:3 fault-nth:23): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:23 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 415.081712][T14242] FAULT_INJECTION: forcing a failure. [ 415.081712][T14242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 415.132441][T14242] CPU: 0 PID: 14242 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 415.141282][T14242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.151338][T14242] Call Trace: [ 415.154641][T14242] dump_stack+0x11d/0x181 [ 415.159021][T14242] should_fail.cold+0xa/0x1a [ 415.163689][T14242] should_fail_alloc_page+0x50/0x60 [ 415.168904][T14242] __alloc_pages_nodemask+0xd2/0x310 [ 415.174207][T14242] alloc_pages_current+0xd1/0x170 [ 415.179289][T14242] __page_cache_alloc+0x183/0x1a0 [ 415.184413][T14242] __do_page_cache_readahead+0x13e/0x390 [ 415.190059][T14242] filemap_fault+0xe8b/0x10a0 [ 415.194769][T14242] __do_fault+0xae/0x1f0 [ 415.199025][T14242] __handle_mm_fault+0x270d/0x2e00 [ 415.204166][T14242] handle_mm_fault+0x21b/0x530 [ 415.208938][T14242] __do_page_fault+0x456/0x8d0 [ 415.214777][T14242] do_page_fault+0x38/0x194 [ 415.219336][T14242] page_fault+0x34/0x40 [ 415.223574][T14242] RIP: 0010:__get_user_4+0x21/0x30 [ 415.228735][T14242] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 415.248434][T14242] RSP: 0018:ffffc90004857d18 EFLAGS: 00010202 [ 415.254510][T14242] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 415.262591][T14242] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 415.270575][T14242] RBP: ffffc90004857e00 R08: ffff88812a201000 R09: 000088821a47b018 [ 415.278562][T14242] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 415.286552][T14242] R13: ffff88809facd800 R14: 000000008004550f R15: ffff88809facd810 [ 415.294636][T14242] ? usbdev_ioctl+0x1473/0x2130 [ 415.299503][T14242] ? usbdev_ioctl+0x147d/0x2130 [ 415.304383][T14242] ? proc_do_submiturb+0x1f30/0x1f30 [ 415.309680][T14242] do_vfs_ioctl+0x84f/0xcf0 [ 415.314229][T14242] ? tomoyo_file_ioctl+0x34/0x40 [ 415.319835][T14242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 415.326134][T14242] ksys_ioctl+0xbd/0xe0 [ 415.330299][T14242] __x64_sys_ioctl+0x4c/0x60 [ 415.334956][T14242] do_syscall_64+0xcc/0x3a0 [ 415.339473][T14242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 415.345367][T14242] RIP: 0033:0x45a919 [ 415.349318][T14242] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.369878][T14242] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:32:24 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 415.378417][T14242] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 415.386390][T14242] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 415.394374][T14242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 415.402342][T14242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 415.410310][T14242] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:26 executing program 0 (fault-call:3 fault-nth:24): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:26 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r3, 0xc0186419, &(0x7f0000000540)={0x5, &(0x7f0000000080)=""/172, &(0x7f00000004c0)=[{0x100, 0xb0, 0x1e7, &(0x7f0000000140)=""/176}, {0x4, 0xe5, 0xffff8000, &(0x7f0000000300)=""/229}, {0xffffffff, 0x9a, 0x6, &(0x7f0000000200)=""/154}, {0x6, 0x43, 0x82c8, &(0x7f0000000400)=""/67}, {0x1, 0x4, 0x3, &(0x7f0000000480)=""/4}]}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 02:32:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x40) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000600)=0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r7, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r8, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r8, 0x80044dfe, &(0x7f0000000280)) ioctl$KVM_CREATE_DEVICE(r7, 0xc00caee0, &(0x7f0000000700)={0x3, r8}) r9 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vcsu\x00', 0xc8001, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r12, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r13 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r13, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r14 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001140)='/dev/cuse\x00', 0x2, 0x0) r15 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r15, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r16 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r16, &(0x7f0000000140), 0xffffffffffffff68, 0x0) syz_open_dev$sndseq(&(0x7f0000001180)='/dev/snd/seq\x00', 0x0, 0x8000) r17 = syz_open_dev$ndb(&(0x7f00000011c0)='/dev/nbd#\x00', 0x0, 0x2) r18 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r18, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg$unix(r2, &(0x7f0000001280)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000040)="f6b1ab0b1eedf83bf66507509090162b016b911575f5e0e71b8d6cef78313d55ea2f837a58b8ee10c4fcd5219f1c7bea917bf958", 0x34}, {&(0x7f0000000400)="8f1a5051c631a6662ac8e157b6ccc8a79e2853a401ebf415a9cdc8eba3f6292b2c98cc52138ce213d89fbe3fc186a34a3876f7905f386f6e669c67801e702b922140119f96144c8e0f10a9f5a89f21bc428c6f6e5f28c93fb5cabec30f533b707f67b7a50805d206d65edd59866493cf7166b19cb1c9b3296fc5db9fe5b44715cc1c4c78df71dce439ec56c51cb6ee6a45a2465495e5b51cb9a2c1402739", 0x9e}, {&(0x7f00000004c0)="cfffc959d08d44a946462911a73742b37cae38918f6bc1d56145f7a95ef7b7d2b9c5fd0836039a69b4572202cdeda7e315312c01b00e13", 0x37}, {&(0x7f0000000500)="3a8d0a28d860f5e4d17057abf6dcc9317ff9e49530d3173bb11a43d0dd570030368f7450562329f9bb854b0ca180910f97b4865321b9d1af8e4fe60c87f3c0469f384fbaf2a72a4e3ed06fea2a4619470d19344354eb6a624313886a81dc5ea31bf6efb294eab874e40fee3ccfd546fd6ff6127d9d041bc84dd0030d1de3958cc9b132eb", 0xfffffc1d}], 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="c2feffffffffffff0100000002000000", @ANYRES32=r3, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32, @ANYRES32, @ANYRES32=r9, @ANYRES32=r0, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r10, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB='\x00\x00\x00\x00'], 0x80, 0x8805}, 0xc010) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 418.014420][T14265] FAULT_INJECTION: forcing a failure. [ 418.014420][T14265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 418.046635][T14268] 9pnet: Insufficient options for proto=fd 02:32:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:26 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) [ 418.069770][T14265] CPU: 1 PID: 14265 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 418.078463][T14265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.088507][T14265] Call Trace: [ 418.091816][T14265] dump_stack+0x11d/0x181 [ 418.096597][T14265] should_fail.cold+0xa/0x1a [ 418.101233][T14265] should_fail_alloc_page+0x50/0x60 [ 418.106448][T14265] __alloc_pages_nodemask+0xd2/0x310 [ 418.111749][T14265] alloc_pages_current+0xd1/0x170 [ 418.116778][T14265] __page_cache_alloc+0x183/0x1a0 [ 418.121843][T14265] __do_page_cache_readahead+0x13e/0x390 [ 418.127495][T14265] filemap_fault+0xe8b/0x10a0 [ 418.132187][T14265] __do_fault+0xae/0x1f0 [ 418.136449][T14265] __handle_mm_fault+0x270d/0x2e00 [ 418.141586][T14265] handle_mm_fault+0x21b/0x530 [ 418.146358][T14265] __do_page_fault+0x456/0x8d0 [ 418.151127][T14265] do_page_fault+0x38/0x194 [ 418.155718][T14265] page_fault+0x34/0x40 [ 418.159885][T14265] RIP: 0010:__get_user_4+0x21/0x30 [ 418.165012][T14265] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 418.170484][T14267] Unknown ioctl -1072409080 [ 418.184621][T14265] RSP: 0018:ffffc90008bc7d18 EFLAGS: 00010202 [ 418.184634][T14265] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 418.184646][T14265] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 418.184658][T14265] RBP: ffffc90008bc7e00 R08: ffff88809c0ab040 R09: 000088821a47b018 [ 418.184669][T14265] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 418.184680][T14265] R13: ffff88809facdb00 R14: 000000008004550f R15: ffff88809facdb10 [ 418.184708][T14265] ? usbdev_ioctl+0x1473/0x2130 [ 418.184727][T14265] ? usbdev_ioctl+0x147d/0x2130 [ 418.184826][T14265] ? proc_do_submiturb+0x1f30/0x1f30 [ 418.193660][T14267] Unknown ioctl -2147201538 [ 418.195341][T14265] do_vfs_ioctl+0x84f/0xcf0 [ 418.195368][T14265] ? tomoyo_file_ioctl+0x34/0x40 [ 418.264110][T14265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.264138][T14265] ksys_ioctl+0xbd/0xe0 [ 418.274504][T14265] __x64_sys_ioctl+0x4c/0x60 [ 418.279108][T14265] do_syscall_64+0xcc/0x3a0 [ 418.283625][T14265] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 418.289515][T14265] RIP: 0033:0x45a919 [ 418.293466][T14265] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:32:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x78d}, "1d9cf92b65686ade", "0522a4148d7a2cc4e523e901570735ac5c3e685fdbc36d16683428e9907cc703", "a8db0ec9", "0ef7e7dd40f8304c"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0xc) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f00000000c0)=""/161, &(0x7f0000000180)=0xa1) r4 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 418.313317][T14265] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 418.321713][T14265] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 418.329678][T14265] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 418.337638][T14265] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 418.345591][T14265] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 418.353586][T14265] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) connect$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x6, 0x8, 0x9, "b9038bb17df7aa4ff4227365c8f17803d026fb953af6b6032243bb47b29c959d4cd2bd3ee19a19e1726ff0f52e5d733b8e8ad623baaafdafcb625858c32744", 0xd}, 0x60) 02:32:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:27 executing program 0 (fault-call:3 fault-nth:25): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 418.536117][T14287] 9pnet: Insufficient options for proto=fd [ 418.628216][T14296] FAULT_INJECTION: forcing a failure. [ 418.628216][T14296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 418.641665][T14296] CPU: 0 PID: 14296 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 418.650336][T14296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.661618][T14296] Call Trace: [ 418.664925][T14296] dump_stack+0x11d/0x181 [ 418.669285][T14296] should_fail.cold+0xa/0x1a [ 418.673895][T14296] should_fail_alloc_page+0x50/0x60 [ 418.679197][T14296] __alloc_pages_nodemask+0xd2/0x310 [ 418.684531][T14296] alloc_pages_current+0xd1/0x170 [ 418.689565][T14296] __page_cache_alloc+0x183/0x1a0 [ 418.694612][T14296] __do_page_cache_readahead+0x13e/0x390 [ 418.700302][T14296] filemap_fault+0xe8b/0x10a0 [ 418.704994][T14296] __do_fault+0xae/0x1f0 [ 418.709243][T14296] __handle_mm_fault+0x270d/0x2e00 [ 418.714447][T14296] handle_mm_fault+0x21b/0x530 [ 418.719281][T14296] __do_page_fault+0x456/0x8d0 [ 418.724050][T14296] do_page_fault+0x38/0x194 [ 418.728557][T14296] page_fault+0x34/0x40 [ 418.732718][T14296] RIP: 0010:__get_user_4+0x21/0x30 [ 418.737904][T14296] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 418.757533][T14296] RSP: 0018:ffffc90008d23d18 EFLAGS: 00010202 [ 418.763599][T14296] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 418.771562][T14296] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 418.779512][T14296] RBP: ffffc90008d23e00 R08: ffff88809c0ab040 R09: 000088821a47b018 [ 418.787542][T14296] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 418.795497][T14296] R13: ffff88809facdb00 R14: 000000008004550f R15: ffff88809facdb10 [ 418.803471][T14296] ? usbdev_ioctl+0x1473/0x2130 [ 418.808319][T14296] ? usbdev_ioctl+0x147d/0x2130 [ 418.813235][T14296] ? proc_do_submiturb+0x1f30/0x1f30 [ 418.818507][T14296] do_vfs_ioctl+0x84f/0xcf0 [ 418.822993][T14296] ? tomoyo_file_ioctl+0x34/0x40 [ 418.827921][T14296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.834438][T14296] ksys_ioctl+0xbd/0xe0 [ 418.838583][T14296] __x64_sys_ioctl+0x4c/0x60 [ 418.843162][T14296] do_syscall_64+0xcc/0x3a0 [ 418.847653][T14296] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 418.853583][T14296] RIP: 0033:0x45a919 [ 418.857469][T14296] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.877052][T14296] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 418.885523][T14296] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 418.893492][T14296] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 418.901447][T14296] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 418.909403][T14296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 418.917454][T14296] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mmap$usbfs(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0xd38d3, 0xffffffffffffffff, 0x5) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x3ff, 0x8, 0x6, @dev={[], 0x1e}, 'eql\x00'}) 02:32:29 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}}) 02:32:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setopts(0x4206, r2, 0x401, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r4, 0xc004ae02, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:29 executing program 0 (fault-call:3 fault-nth:26): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 421.131513][T14313] Unknown ioctl -1072409080 [ 421.158011][T14313] Unknown ioctl -2147201538 [ 421.165814][T14317] FAULT_INJECTION: forcing a failure. [ 421.165814][T14317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 421.189843][T14317] CPU: 0 PID: 14317 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 421.195510][T14313] Unknown ioctl 21519 [ 421.199138][T14317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.199145][T14317] Call Trace: [ 421.199212][T14317] dump_stack+0x11d/0x181 [ 421.199243][T14317] should_fail.cold+0xa/0x1a [ 421.225554][T14317] should_fail_alloc_page+0x50/0x60 [ 421.230836][T14317] __alloc_pages_nodemask+0xd2/0x310 [ 421.236135][T14317] alloc_pages_current+0xd1/0x170 [ 421.241193][T14317] __page_cache_alloc+0x183/0x1a0 [ 421.246229][T14317] __do_page_cache_readahead+0x13e/0x390 [ 421.248129][T14320] 9pnet: Insufficient options for proto=fd [ 421.251882][T14317] filemap_fault+0xe8b/0x10a0 [ 421.251951][T14317] __do_fault+0xae/0x1f0 [ 421.266637][T14317] __handle_mm_fault+0x270d/0x2e00 [ 421.271846][T14317] handle_mm_fault+0x21b/0x530 [ 421.276650][T14317] __do_page_fault+0x456/0x8d0 [ 421.281430][T14317] do_page_fault+0x38/0x194 [ 421.285941][T14317] page_fault+0x34/0x40 [ 421.289960][T14326] Unknown ioctl -1072409080 [ 421.290173][T14317] RIP: 0010:__get_user_4+0x21/0x30 02:32:29 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000280)) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x111001, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r1) 02:32:29 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) [ 421.299819][T14317] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 421.319431][T14317] RSP: 0018:ffffc90009007d18 EFLAGS: 00010202 [ 421.325500][T14317] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 421.333480][T14317] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 421.341455][T14317] RBP: ffffc90009007e00 R08: ffff88812a201000 R09: 000088821a47b018 [ 421.349424][T14317] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 421.357391][T14317] R13: ffff88809c016b00 R14: 000000008004550f R15: ffff88809c016b10 [ 421.365384][T14317] ? usbdev_ioctl+0x1473/0x2130 [ 421.370242][T14317] ? usbdev_ioctl+0x147d/0x2130 [ 421.375188][T14317] ? proc_do_submiturb+0x1f30/0x1f30 [ 421.378758][T14330] Unknown ioctl -1072409080 [ 421.381549][T14317] do_vfs_ioctl+0x84f/0xcf0 [ 421.387442][T14330] Unknown ioctl -2147201538 [ 421.390453][T14317] ? tomoyo_file_ioctl+0x34/0x40 [ 421.390476][T14317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.390505][T14317] ksys_ioctl+0xbd/0xe0 [ 421.410311][T14317] __x64_sys_ioctl+0x4c/0x60 [ 421.414974][T14317] do_syscall_64+0xcc/0x3a0 [ 421.417967][T14330] Unknown ioctl -1072409080 [ 421.419521][T14317] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 421.419587][T14317] RIP: 0033:0x45a919 [ 421.425138][T14331] Unknown ioctl -2147201538 [ 421.429966][T14317] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.429994][T14317] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 421.430015][T14317] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 421.430024][T14317] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 421.430044][T14317] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 421.490593][T14317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 421.490642][T14317] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:30 executing program 0 (fault-call:3 fault-nth:27): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x80000001) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8c484, 0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0xb, 0x3f, r3, &(0x7f0000000000)="3b8d954dee260326592ed7e3cf8b179ec5d0f1c5bdce55dc606c131cf747962160747d785bfbdbc8904f6c990600e05079e75bc03d087ccbc0f6fb25b64f635e08ef07d7e563ff6d1c16d08678dc2a267146aff10b02cb3885610f047ebef7ad4bb70b405487b9978e25564533b1f21db779c22bc1435a0d4c66f76d6485fdc166a99a01538cac2eb1a4a97197348a474287857b87794f65993618d940245f3cfd8e23cbb5fe4f82f6ee33778948e6cba44039aa2cc4375fa120f6c53511b19772d312a55c5cd9499dcb133ff4a79e763a0d", 0xd2, 0x401, 0x0, 0x1, r4}]) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:30 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) [ 421.640730][T14336] 9pnet: Insufficient options for proto=fd [ 421.673240][T14338] FAULT_INJECTION: forcing a failure. [ 421.673240][T14338] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 421.736360][T14342] 9pnet: Insufficient options for proto=fd [ 421.748715][T14338] CPU: 1 PID: 14338 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 421.757956][T14338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.768015][T14338] Call Trace: [ 421.771581][T14338] dump_stack+0x11d/0x181 [ 421.776530][T14338] should_fail.cold+0xa/0x1a [ 421.781129][T14338] should_fail_alloc_page+0x50/0x60 [ 421.786335][T14338] __alloc_pages_nodemask+0xd2/0x310 [ 421.791631][T14338] alloc_pages_current+0xd1/0x170 [ 421.796774][T14338] __page_cache_alloc+0x183/0x1a0 [ 421.801816][T14338] __do_page_cache_readahead+0x13e/0x390 [ 421.807560][T14338] filemap_fault+0xe8b/0x10a0 [ 421.812283][T14338] __do_fault+0xae/0x1f0 [ 421.816584][T14338] __handle_mm_fault+0x270d/0x2e00 [ 421.821722][T14338] handle_mm_fault+0x21b/0x530 [ 421.826554][T14338] __do_page_fault+0x456/0x8d0 [ 421.831321][T14338] do_page_fault+0x38/0x194 02:32:30 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 421.835811][T14338] page_fault+0x34/0x40 [ 421.839989][T14338] RIP: 0010:__get_user_4+0x21/0x30 [ 421.845138][T14338] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 421.864767][T14338] RSP: 0018:ffffc90009093d18 EFLAGS: 00010202 [ 421.871612][T14338] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 421.879597][T14338] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 421.887553][T14338] RBP: ffffc90009093e00 R08: ffff88809f4aa080 R09: 000088821a47b018 [ 421.895512][T14338] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 421.903468][T14338] R13: ffff88809f42b200 R14: 000000008004550f R15: ffff88809f42b210 [ 421.911448][T14338] ? usbdev_ioctl+0x1473/0x2130 [ 421.916297][T14338] ? usbdev_ioctl+0x147d/0x2130 [ 421.921215][T14338] ? proc_do_submiturb+0x1f30/0x1f30 [ 421.926505][T14338] do_vfs_ioctl+0x84f/0xcf0 [ 421.930996][T14338] ? tomoyo_file_ioctl+0x34/0x40 [ 421.935989][T14338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.942254][T14338] ksys_ioctl+0xbd/0xe0 [ 421.946394][T14338] __x64_sys_ioctl+0x4c/0x60 [ 421.950976][T14338] do_syscall_64+0xcc/0x3a0 [ 421.955565][T14338] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 421.962390][T14338] RIP: 0033:0x45a919 [ 421.966299][T14338] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.985900][T14338] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 421.994292][T14338] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 422.002312][T14338] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 422.010270][T14338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 422.018234][T14338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 422.026265][T14338] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:32 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) 02:32:32 executing program 0 (fault-call:3 fault-nth:28): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x400, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20a000, 0x0) getdents64(r2, &(0x7f00000000c0)=""/104, 0x68) [ 424.251720][T14355] FAULT_INJECTION: forcing a failure. [ 424.251720][T14355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 424.272922][T14360] 9pnet: Insufficient options for proto=fd [ 424.316767][T14355] CPU: 1 PID: 14355 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 424.325477][T14355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.335553][T14355] Call Trace: [ 424.338861][T14355] dump_stack+0x11d/0x181 [ 424.343208][T14355] should_fail.cold+0xa/0x1a [ 424.347811][T14355] should_fail_alloc_page+0x50/0x60 [ 424.353088][T14355] __alloc_pages_nodemask+0xd2/0x310 [ 424.358395][T14355] alloc_pages_current+0xd1/0x170 02:32:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev\x00', 0xcf8193e2f2a4bf48, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x2000050000}]}) fsetxattr$security_evm(0xffffffffffffff9c, &(0x7f0000000040)='security.evm\x00', 0x0, 0x276, 0x2) [ 424.363443][T14355] __page_cache_alloc+0x183/0x1a0 [ 424.368477][T14355] __do_page_cache_readahead+0x13e/0x390 [ 424.374224][T14355] filemap_fault+0xe8b/0x10a0 [ 424.378997][T14355] __do_fault+0xae/0x1f0 [ 424.383282][T14355] __handle_mm_fault+0x270d/0x2e00 [ 424.388415][T14355] handle_mm_fault+0x21b/0x530 [ 424.393216][T14355] __do_page_fault+0x456/0x8d0 [ 424.397994][T14355] do_page_fault+0x38/0x194 [ 424.402513][T14355] page_fault+0x34/0x40 [ 424.406675][T14355] RIP: 0010:__get_user_4+0x21/0x30 02:32:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x10000, 0x0, [0x10001, 0x6, 0x8, 0x3, 0x6, 0x1b1, 0x800, 0x6]}) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x2) r4 = gettid() tkill(r4, 0x1000000000013) wait4(r4, &(0x7f0000000100), 0x6, &(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) [ 424.411799][T14355] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 424.431474][T14355] RSP: 0018:ffffc900091afd18 EFLAGS: 00010202 [ 424.437549][T14355] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 424.445542][T14355] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 424.453541][T14355] RBP: ffffc900091afe00 R08: ffff88809f4aa080 R09: 000088821a47b018 02:32:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) r3 = gettid() r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x45, &(0x7f0000000040)="1e713a5e91805c460fb2d894dde754ef625610e43c02226d00c5731301", 0x446) ptrace$setopts(0x4206, r3, 0x0, 0x9c9a9925e9817748) tkill(r3, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 424.461521][T14355] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 424.469497][T14355] R13: ffff88809f42b200 R14: 000000008004550f R15: ffff88809f42b210 [ 424.477498][T14355] ? usbdev_ioctl+0x1473/0x2130 [ 424.482366][T14355] ? usbdev_ioctl+0x147d/0x2130 [ 424.487231][T14355] ? proc_do_submiturb+0x1f30/0x1f30 [ 424.492605][T14355] do_vfs_ioctl+0x84f/0xcf0 [ 424.497165][T14355] ? tomoyo_file_ioctl+0x34/0x40 [ 424.502128][T14355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.508386][T14355] ksys_ioctl+0xbd/0xe0 [ 424.512601][T14355] __x64_sys_ioctl+0x4c/0x60 [ 424.517224][T14355] do_syscall_64+0xcc/0x3a0 [ 424.521861][T14355] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 424.527754][T14355] RIP: 0033:0x45a919 [ 424.531660][T14355] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.551311][T14355] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 424.559729][T14355] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 424.567709][T14355] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 424.575684][T14355] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 424.583655][T14355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 424.591634][T14355] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:33 executing program 0 (fault-call:3 fault-nth:29): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) sched_getscheduler(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100), 0x200001c4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, 0x0, &(0x7f0000002000)) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000040)={r5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x7f, 0x54d, 0x7, 0x476, 0x2, 0x81, 0x5, 0x4, r5}, 0x20) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r7, 0x29, 0x15, &(0x7f0000000180)="07625b571daf0e41c5d9c21d7674930386e3080002a592a9fa1e4696000070d55fff598d05ab1450044fcfa327e9acaf3dfdbec5d45c441105567785361d9002d8c6a32f29030a663436889905fd5e75d25ebb1280e6af9490146ef9320dab305360f7483bcfd0520900000a00000000f92db58268ef254d5fdd676867f0ea6ab57fc9f15a582904b19ceefdb001dc027f5f95ed5c6aeb4554df81d8712a9842ae7a5bffd3362bc61205037a641a4b9e2efa4e4e1416bd08e181d5ed3a7dfdc1511629fdb14e7a108601c12684183c39e17efb00"/236, 0xfffffffffffffdfb) ptrace$setopts(0x4206, r6, 0x0, 0x0) r8 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) write$cgroup_pid(r8, &(0x7f0000000040)=r6, 0x12) tkill(r6, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 424.816634][T14385] FAULT_INJECTION: forcing a failure. [ 424.816634][T14385] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 424.844548][T14385] CPU: 1 PID: 14385 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 424.853259][T14385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.863313][T14385] Call Trace: [ 424.866616][T14385] dump_stack+0x11d/0x181 [ 424.870965][T14385] should_fail.cold+0xa/0x1a [ 424.875573][T14385] should_fail_alloc_page+0x50/0x60 [ 424.880827][T14385] __alloc_pages_nodemask+0xd2/0x310 [ 424.886186][T14385] alloc_pages_current+0xd1/0x170 [ 424.891221][T14385] __page_cache_alloc+0x183/0x1a0 [ 424.896325][T14385] __do_page_cache_readahead+0x13e/0x390 [ 424.901977][T14385] filemap_fault+0xe8b/0x10a0 [ 424.906745][T14385] __do_fault+0xae/0x1f0 [ 424.910998][T14385] __handle_mm_fault+0x270d/0x2e00 [ 424.916223][T14385] handle_mm_fault+0x21b/0x530 [ 424.921115][T14385] __do_page_fault+0x456/0x8d0 [ 424.925891][T14385] do_page_fault+0x38/0x194 [ 424.930498][T14385] page_fault+0x34/0x40 [ 424.934664][T14385] RIP: 0010:__get_user_4+0x21/0x30 [ 424.939863][T14385] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 424.960255][T14385] RSP: 0018:ffffc90009197d18 EFLAGS: 00010202 [ 424.966326][T14385] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 424.974303][T14385] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 424.982286][T14385] RBP: ffffc90009197e00 R08: ffff88812a201000 R09: 00000000aaaaaaab [ 424.990260][T14385] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 424.998234][T14385] R13: ffff88809f42b200 R14: 000000008004550f R15: ffff88809f42b210 [ 425.006222][T14385] ? usbdev_ioctl+0x1473/0x2130 [ 425.011159][T14385] ? usbdev_ioctl+0x147d/0x2130 [ 425.016180][T14385] ? proc_do_submiturb+0x1f30/0x1f30 [ 425.021607][T14385] do_vfs_ioctl+0x84f/0xcf0 [ 425.026121][T14385] ? tomoyo_file_ioctl+0x34/0x40 [ 425.031058][T14385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.037302][T14385] ksys_ioctl+0xbd/0xe0 [ 425.041580][T14385] __x64_sys_ioctl+0x4c/0x60 [ 425.046168][T14385] do_syscall_64+0xcc/0x3a0 [ 425.050686][T14385] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 425.056579][T14385] RIP: 0033:0x45a919 [ 425.060574][T14385] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.080248][T14385] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.088694][T14385] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 425.096666][T14385] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 425.104637][T14385] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 425.112650][T14385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 425.120638][T14385] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x4b72, &(0x7f0000000080)=0x2) 02:32:35 executing program 0 (fault-call:3 fault-nth:30): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000000), 0x4) setsockopt$inet6_dccp_buf(r2, 0x21, 0xc, &(0x7f00000000c0)="6962bfd5a1490ab345c687249c803fc25564cf00ac95186a57a92a2f71f46da9a7aae971f96a9ab7a37c82d55ad23dd77754dc271eb3e14cf415feff4e0149d53e98978615bc5280c6b56be51c40009e97cc9ab54cc97e56a2c9e61419a140cd497aced7949a26d3fd75e30b260c8fca4c4097daa422f4df1d23f00f67b7c93e06413a8db2b96b2378218371351abbaec0edc706e52248cba09e1dfe714323fd04a35566545ee49313cbf82232d489dff5993dd5b21a562306a030c286f3e25026a4176eba5f74c122214fa343f0867083471ba125ceb2ca2496d1158e167eec29d667", 0xe3) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 427.367061][T14399] FAULT_INJECTION: forcing a failure. [ 427.367061][T14399] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 427.380410][T14399] CPU: 0 PID: 14399 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 427.389153][T14399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.399208][T14399] Call Trace: [ 427.402580][T14399] dump_stack+0x11d/0x181 [ 427.406925][T14399] should_fail.cold+0xa/0x1a [ 427.411528][T14399] should_fail_alloc_page+0x50/0x60 [ 427.416745][T14399] __alloc_pages_nodemask+0xd2/0x310 [ 427.422118][T14399] alloc_pages_current+0xd1/0x170 [ 427.427163][T14399] __page_cache_alloc+0x183/0x1a0 [ 427.432200][T14399] __do_page_cache_readahead+0x13e/0x390 [ 427.437940][T14399] filemap_fault+0xe8b/0x10a0 [ 427.442633][T14399] __do_fault+0xae/0x1f0 [ 427.446894][T14399] __handle_mm_fault+0x270d/0x2e00 [ 427.452088][T14399] ? string_nocheck+0xe8/0x100 [ 427.456863][T14399] handle_mm_fault+0x21b/0x530 [ 427.461639][T14399] __do_page_fault+0x456/0x8d0 [ 427.466435][T14399] do_page_fault+0x38/0x194 [ 427.470944][T14399] page_fault+0x34/0x40 [ 427.475114][T14399] RIP: 0010:__get_user_4+0x21/0x30 [ 427.480256][T14399] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 427.499865][T14399] RSP: 0018:ffffc90000e73d18 EFLAGS: 00010202 [ 427.505939][T14399] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 427.513958][T14399] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 427.522490][T14399] RBP: ffffc90000e73e00 R08: ffff88812a201000 R09: 000088821a47b018 [ 427.530491][T14399] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 427.539002][T14399] R13: ffff88809f42b200 R14: 000000008004550f R15: ffff88809f42b210 [ 427.547017][T14399] ? usbdev_ioctl+0x1473/0x2130 [ 427.551965][T14399] ? usbdev_ioctl+0x147d/0x2130 [ 427.556850][T14399] ? proc_do_submiturb+0x1f30/0x1f30 [ 427.562169][T14399] do_vfs_ioctl+0x84f/0xcf0 [ 427.566760][T14399] ? tomoyo_file_ioctl+0x34/0x40 [ 427.571756][T14399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.578754][T14399] ksys_ioctl+0xbd/0xe0 [ 427.582919][T14399] __x64_sys_ioctl+0x4c/0x60 [ 427.587620][T14399] do_syscall_64+0xcc/0x3a0 [ 427.592155][T14399] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 427.598068][T14399] RIP: 0033:0x45a919 02:32:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000000)={0x1810f, 0x3}) [ 427.602023][T14399] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.622470][T14399] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.630938][T14399] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 427.638991][T14399] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 427.646963][T14399] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 427.654954][T14399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 02:32:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 02:32:36 executing program 0 (fault-call:3 fault-nth:31): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 427.662915][T14399] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:36 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:36 executing program 3: r0 = socket(0x2, 0x1, 0x4) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) fallocate(r0, 0x20, 0x4, 0xfffffffffffffff8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-c\xefntrol\x00', 0x8000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) [ 427.885537][T14518] FAULT_INJECTION: forcing a failure. [ 427.885537][T14518] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 427.925421][T14518] CPU: 0 PID: 14518 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 427.934138][T14518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.945022][T14518] Call Trace: [ 427.948355][T14518] dump_stack+0x11d/0x181 [ 427.952724][T14518] should_fail.cold+0xa/0x1a [ 427.957351][T14518] should_fail_alloc_page+0x50/0x60 [ 427.962577][T14518] __alloc_pages_nodemask+0xd2/0x310 [ 427.967960][T14518] alloc_pages_current+0xd1/0x170 [ 427.973601][T14518] __page_cache_alloc+0x183/0x1a0 [ 427.978877][T14518] __do_page_cache_readahead+0x13e/0x390 [ 427.984595][T14518] filemap_fault+0xe8b/0x10a0 [ 427.989749][T14518] __do_fault+0xae/0x1f0 [ 427.994076][T14518] __handle_mm_fault+0x270d/0x2e00 [ 427.999224][T14518] handle_mm_fault+0x21b/0x530 [ 428.004007][T14518] __do_page_fault+0x456/0x8d0 [ 428.008801][T14518] do_page_fault+0x38/0x194 [ 428.013315][T14518] page_fault+0x34/0x40 [ 428.017659][T14518] RIP: 0010:__get_user_4+0x21/0x30 02:32:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff64, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x179) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:32:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000040)=0x3) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 428.022825][T14518] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 428.043536][T14518] RSP: 0018:ffffc90000f23d18 EFLAGS: 00010202 [ 428.049698][T14518] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 428.057721][T14518] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 428.065701][T14518] RBP: ffffc90000f23e00 R08: ffff88809f4aa080 R09: 000088821a47b018 [ 428.073772][T14518] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 428.081752][T14518] R13: ffff88809f42b200 R14: 000000008004550f R15: ffff88809f42b210 [ 428.089878][T14518] ? usbdev_ioctl+0x1473/0x2130 [ 428.094764][T14518] ? usbdev_ioctl+0x147d/0x2130 [ 428.099638][T14518] ? proc_do_submiturb+0x1f30/0x1f30 [ 428.104926][T14518] do_vfs_ioctl+0x84f/0xcf0 [ 428.109444][T14518] ? tomoyo_file_ioctl+0x34/0x40 [ 428.115207][T14518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.121462][T14518] ksys_ioctl+0xbd/0xe0 [ 428.125751][T14518] __x64_sys_ioctl+0x4c/0x60 [ 428.130418][T14518] do_syscall_64+0xcc/0x3a0 [ 428.134962][T14518] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 428.141016][T14518] RIP: 0033:0x45a919 [ 428.145006][T14518] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.164821][T14518] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 428.173372][T14518] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 428.181341][T14518] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 428.189335][T14518] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 428.197484][T14518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 428.205670][T14518] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:39 executing program 5: finit_module(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x4) unshare(0x40000000) r0 = dup(0xffffffffffffffff) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @empty, 'vlan0\x00'}}, 0x1e) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000000c0)=""/59) 02:32:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:39 executing program 0 (fault-call:3 fault-nth:32): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:39 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x101000, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = creat(&(0x7f0000000880)='./file0\x00', 0x1) getpeername$netlink(r2, &(0x7f00000008c0), &(0x7f0000000900)=0xc) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) open(&(0x7f0000000040)='./file0\x00', 0x8400, 0x12) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) r7 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r7, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4800, 0x0) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r10) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r10) 02:32:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4200, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = gettid() tkill(r2, 0x1000000000013) tkill(r2, 0x4) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xa38f, 0x101}, 0xc) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 430.693767][T14652] FAULT_INJECTION: forcing a failure. [ 430.693767][T14652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 430.725725][ T27] audit: type=1804 audit(1576981959.314:42): pid=14654 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir456046839/syzkaller.x0Cszr/176/file0" dev="sda1" ino=17364 res=1 [ 430.746777][T14653] IPVS: ftp: loaded support on port[0] = 21 [ 430.768446][T14652] CPU: 1 PID: 14652 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 430.777297][T14652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.787364][T14652] Call Trace: [ 430.790666][T14652] dump_stack+0x11d/0x181 [ 430.795009][T14652] should_fail.cold+0xa/0x1a [ 430.799646][T14652] should_fail_alloc_page+0x50/0x60 [ 430.804866][T14652] __alloc_pages_nodemask+0xd2/0x310 [ 430.810338][T14652] alloc_pages_current+0xd1/0x170 [ 430.815389][T14652] __page_cache_alloc+0x183/0x1a0 [ 430.821160][T14652] __do_page_cache_readahead+0x13e/0x390 [ 430.826872][T14652] filemap_fault+0xe8b/0x10a0 [ 430.831645][T14652] __do_fault+0xae/0x1f0 [ 430.835892][T14652] __handle_mm_fault+0x270d/0x2e00 [ 430.841025][T14652] handle_mm_fault+0x21b/0x530 [ 430.845899][T14652] __do_page_fault+0x456/0x8d0 [ 430.850701][T14652] do_page_fault+0x38/0x194 [ 430.855310][T14652] page_fault+0x34/0x40 [ 430.859473][T14652] RIP: 0010:__get_user_4+0x21/0x30 [ 430.864627][T14652] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 430.885903][T14652] RSP: 0018:ffffc9000107bd18 EFLAGS: 00010202 [ 430.892056][T14652] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 430.900109][T14652] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 430.908094][T14652] RBP: ffffc9000107be00 R08: ffff88809c0ab040 R09: 000088821a47b018 [ 430.916072][T14652] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 430.924246][T14652] R13: ffff88812149c500 R14: 000000008004550f R15: ffff88812149c510 [ 430.932248][T14652] ? usbdev_ioctl+0x1473/0x2130 [ 430.937126][T14652] ? usbdev_ioctl+0x147d/0x2130 [ 430.942004][T14652] ? proc_do_submiturb+0x1f30/0x1f30 [ 430.947301][T14652] do_vfs_ioctl+0x84f/0xcf0 [ 430.951807][T14652] ? tomoyo_file_ioctl+0x34/0x40 [ 430.956804][T14652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.963057][T14652] ksys_ioctl+0xbd/0xe0 [ 430.967270][T14652] __x64_sys_ioctl+0x4c/0x60 [ 430.971869][T14652] do_syscall_64+0xcc/0x3a0 [ 430.976423][T14652] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 430.982316][T14652] RIP: 0033:0x45a919 [ 430.986208][T14652] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.005814][T14652] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.014404][T14652] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 431.022373][T14652] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 431.030409][T14652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:32:39 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @rand_addr="461d068be5371710040da633890be8b1"}}, 0x5c) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) 02:32:39 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) [ 431.038385][T14652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 431.046485][T14652] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:39 executing program 0 (fault-call:3 fault-nth:33): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 431.098666][T14866] 9pnet: Insufficient options for proto=fd 02:32:39 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno'}}) [ 431.194944][T14869] FAULT_INJECTION: forcing a failure. [ 431.194944][T14869] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.209168][ T27] audit: type=1804 audit(1576981959.784:43): pid=14657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir456046839/syzkaller.x0Cszr/176/file0" dev="sda1" ino=17364 res=1 [ 431.228542][T14869] CPU: 1 PID: 14869 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 431.243392][T14869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.253452][T14869] Call Trace: [ 431.256859][T14869] dump_stack+0x11d/0x181 [ 431.261245][T14869] should_fail.cold+0xa/0x1a [ 431.265881][T14869] should_fail_alloc_page+0x50/0x60 [ 431.271093][T14869] __alloc_pages_nodemask+0xd2/0x310 [ 431.274779][T14872] 9pnet: Insufficient options for proto=fd [ 431.276439][T14869] alloc_pages_current+0xd1/0x170 [ 431.276468][T14869] __page_cache_alloc+0x183/0x1a0 [ 431.292346][T14869] __do_page_cache_readahead+0x13e/0x390 [ 431.297990][T14869] filemap_fault+0xe8b/0x10a0 [ 431.302679][T14869] __do_fault+0xae/0x1f0 [ 431.306988][T14869] __handle_mm_fault+0x270d/0x2e00 [ 431.312260][T14869] handle_mm_fault+0x21b/0x530 [ 431.317099][T14869] __do_page_fault+0x456/0x8d0 [ 431.321861][T14869] do_page_fault+0x38/0x194 [ 431.326391][T14869] page_fault+0x34/0x40 [ 431.330593][T14869] RIP: 0010:__get_user_4+0x21/0x30 [ 431.335745][T14869] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 431.355341][T14869] RSP: 0018:ffffc90000f87d18 EFLAGS: 00010202 [ 431.361404][T14869] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 431.369400][T14869] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 431.377386][T14869] RBP: ffffc90000f87e00 R08: ffff88809c0ab040 R09: 000088821a47b018 [ 431.385356][T14869] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 431.393334][T14869] R13: ffff88812a111400 R14: 000000008004550f R15: ffff88812a111410 [ 431.401306][T14869] ? usbdev_ioctl+0x1473/0x2130 [ 431.406145][T14869] ? usbdev_ioctl+0x147d/0x2130 [ 431.411148][T14869] ? proc_do_submiturb+0x1f30/0x1f30 [ 431.416433][T14869] do_vfs_ioctl+0x84f/0xcf0 [ 431.420921][T14869] ? tomoyo_file_ioctl+0x34/0x40 [ 431.425878][T14869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.432234][T14869] ksys_ioctl+0xbd/0xe0 [ 431.436385][T14869] __x64_sys_ioctl+0x4c/0x60 [ 431.440986][T14869] do_syscall_64+0xcc/0x3a0 [ 431.445480][T14869] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 431.451377][T14869] RIP: 0033:0x45a919 [ 431.455276][T14869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.474890][T14869] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.484549][T14869] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 02:32:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x78d}, "1d9cf92b65686ade", "0522a4148d7a2cc4e523e901570735ac5c3e685fdbc36d16683428e9907cc703", "a8db0ec9", "0ef7e7dd40f8304c"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0xc) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f00000000c0)=""/161, &(0x7f0000000180)=0xa1) r4 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 431.492635][T14869] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 431.500600][T14869] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 431.508575][T14869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 431.516632][T14869] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 [ 431.544579][ T561] tipc: TX() has been purged, node left! 02:32:40 executing program 0 (fault-call:3 fault-nth:34): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 431.683698][T14879] FAULT_INJECTION: forcing a failure. [ 431.683698][T14879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.701683][T14879] CPU: 1 PID: 14879 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 431.710651][T14879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.720813][T14879] Call Trace: [ 431.724114][T14879] dump_stack+0x11d/0x181 [ 431.728460][T14879] should_fail.cold+0xa/0x1a [ 431.733076][T14879] should_fail_alloc_page+0x50/0x60 [ 431.738332][T14879] __alloc_pages_nodemask+0xd2/0x310 [ 431.743655][T14879] alloc_pages_current+0xd1/0x170 [ 431.748785][T14879] __page_cache_alloc+0x183/0x1a0 [ 431.753896][T14879] __do_page_cache_readahead+0x13e/0x390 [ 431.759615][T14879] filemap_fault+0xe8b/0x10a0 [ 431.764313][T14879] __do_fault+0xae/0x1f0 [ 431.768635][T14879] __handle_mm_fault+0x270d/0x2e00 [ 431.773823][T14879] handle_mm_fault+0x21b/0x530 [ 431.778605][T14879] __do_page_fault+0x456/0x8d0 [ 431.783480][T14879] do_page_fault+0x38/0x194 [ 431.788078][T14879] page_fault+0x34/0x40 [ 431.792279][T14879] RIP: 0010:__get_user_4+0x21/0x30 [ 431.797387][T14879] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 431.817091][T14879] RSP: 0018:ffffc90001153d18 EFLAGS: 00010202 [ 431.823142][T14879] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 431.831114][T14879] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 431.839079][T14879] RBP: ffffc90001153e00 R08: ffff88812a28d0c0 R09: 000088821a47b018 [ 431.847079][T14879] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 431.855052][T14879] R13: ffff88812a111400 R14: 000000008004550f R15: ffff88812a111410 [ 431.863040][T14879] ? usbdev_ioctl+0x1473/0x2130 [ 431.867888][T14879] ? usbdev_ioctl+0x147d/0x2130 [ 431.872783][T14879] ? proc_do_submiturb+0x1f30/0x1f30 [ 431.878063][T14879] do_vfs_ioctl+0x84f/0xcf0 [ 431.882615][T14879] ? tomoyo_file_ioctl+0x34/0x40 [ 431.887609][T14879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.894463][T14879] ksys_ioctl+0xbd/0xe0 [ 431.898687][T14879] __x64_sys_ioctl+0x4c/0x60 [ 431.903266][T14879] do_syscall_64+0xcc/0x3a0 [ 431.907856][T14879] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 431.913745][T14879] RIP: 0033:0x45a919 [ 431.917758][T14879] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.937373][T14879] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.947013][T14879] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 431.954972][T14879] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 431.962940][T14879] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 431.970908][T14879] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 431.978863][T14879] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:42 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x3, 0x2) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)=0x20) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000200)={0x5e, @multicast2, 0x4e23, 0x0, 'wlc\x00', 0x2d, 0x1, 0x3b}, 0x2c) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="5e6a6f70bcd67348aab232a013235b53b2d5c2b67ef00ed4e672267df5feaecf236b1b0b6c165629fd3aa6e96f70d3e49845a29909bb1c3e197d268c33f2345d444dc9349a971dcf1053e1803e946c574b45b89060acc86339c18c15f9d2890c074b211524f90dea26e4abea03380ea2474d5dc78d6b49bcd6b130cb32c32cd669b44402819dab5142b13f3eb5b81cb927fb3d4346ad601ac17e979e65c2d143761c652e88e858d4d5c68c27c7c5681e9201f93b2908b7", 0xb7}], 0x1, 0x2) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:32:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x78d}, "1d9cf92b65686ade", "0522a4148d7a2cc4e523e901570735ac5c3e685fdbc36d16683428e9907cc703", "a8db0ec9", "0ef7e7dd40f8304c"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0xc) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f00000000c0)=""/161, &(0x7f0000000180)=0xa1) r4 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:42 executing program 0 (fault-call:3 fault-nth:35): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)={0x3, 'bridge0\x00', {0x8000}, 0x713e}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x30a00, 0xb54fcaef122fe15a) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 433.758529][T14890] IPVS: set_ctl: invalid protocol: 94 224.0.0.2:20003 [ 433.783110][T14891] FAULT_INJECTION: forcing a failure. [ 433.783110][T14891] name failslab, interval 1, probability 0, space 0, times 0 [ 433.834612][T14891] CPU: 1 PID: 14891 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 433.843399][T14891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.853546][T14891] Call Trace: [ 433.856847][T14891] dump_stack+0x11d/0x181 [ 433.861247][T14891] should_fail.cold+0xa/0x1a [ 433.865869][T14891] ? mempool_free+0x1b0/0x1b0 [ 433.870554][T14891] __should_failslab+0xee/0x130 [ 433.875419][T14891] should_failslab+0x9/0x14 [ 433.879946][T14891] kmem_cache_alloc+0x29/0x5d0 [ 433.884753][T14891] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 433.890663][T14891] ? mempool_free+0x1b0/0x1b0 [ 433.895350][T14891] mempool_alloc_slab+0x27/0x40 [ 433.900214][T14891] mempool_alloc+0x8e/0x270 [ 433.904736][T14891] ? __count_memcg_events+0x8c/0x110 [ 433.910037][T14891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.917209][T14891] ? memcg_check_events+0x77/0x2c0 [ 433.922408][T14891] bio_alloc_bioset+0x223/0x3e0 [ 433.927315][T14891] ? mem_cgroup_commit_charge+0xcd/0x7d0 [ 433.933022][T14891] ? __this_cpu_preempt_check+0x45/0x140 [ 433.939234][T14891] mpage_alloc.isra.0+0x46/0x190 [ 433.944185][T14891] do_mpage_readpage+0xb2f/0x10e0 [ 433.949258][T14891] ? add_to_page_cache_lru+0x174/0x260 [ 433.954777][T14891] mpage_readpages+0x2b8/0x3c0 [ 433.959563][T14891] ? constant_test_bit.constprop.0+0x20/0x20 [ 433.965550][T14891] ? blkdev_write_begin+0x60/0x60 [ 433.970581][T14891] blkdev_readpages+0x36/0x50 [ 433.975303][T14891] read_pages+0xa2/0x2d0 [ 433.979581][T14891] ? 0xffffffff81000000 [ 433.983747][T14891] __do_page_cache_readahead+0x353/0x390 [ 433.989467][T14891] filemap_fault+0xe8b/0x10a0 [ 433.994163][T14891] __do_fault+0xae/0x1f0 [ 433.998452][T14891] __handle_mm_fault+0x270d/0x2e00 [ 434.003577][T14891] ? string_nocheck+0xe8/0x100 [ 434.008468][T14891] handle_mm_fault+0x21b/0x530 [ 434.013320][T14891] __do_page_fault+0x456/0x8d0 [ 434.018800][T14891] do_page_fault+0x38/0x194 [ 434.023338][T14891] page_fault+0x34/0x40 [ 434.027535][T14891] RIP: 0010:__get_user_4+0x21/0x30 [ 434.032665][T14891] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 434.052377][T14891] RSP: 0018:ffffc90001247d18 EFLAGS: 00010202 [ 434.058476][T14891] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 434.066472][T14891] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 434.074470][T14891] RBP: ffffc90001247e00 R08: ffff88812a28d0c0 R09: 000088821a47b018 [ 434.082545][T14891] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 434.090524][T14891] R13: ffff88809facd100 R14: 000000008004550f R15: ffff88809facd110 [ 434.098552][T14891] ? usbdev_ioctl+0x1473/0x2130 [ 434.103419][T14891] ? usbdev_ioctl+0x147d/0x2130 [ 434.108291][T14891] ? proc_do_submiturb+0x1f30/0x1f30 [ 434.113705][T14891] do_vfs_ioctl+0x84f/0xcf0 [ 434.118282][T14891] ? tomoyo_file_ioctl+0x34/0x40 [ 434.123304][T14891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.129617][T14891] ksys_ioctl+0xbd/0xe0 [ 434.133814][T14891] __x64_sys_ioctl+0x4c/0x60 [ 434.138483][T14891] do_syscall_64+0xcc/0x3a0 [ 434.143019][T14891] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 434.149044][T14891] RIP: 0033:0x45a919 [ 434.153041][T14891] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.172842][T14891] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 02:32:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000000)) socket$can_raw(0x1d, 0x3, 0x1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000000c0)={0x5f3, 0x6}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'vlan0\x00'}) 02:32:42 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x78d}, "1d9cf92b65686ade", "0522a4148d7a2cc4e523e901570735ac5c3e685fdbc36d16683428e9907cc703", "a8db0ec9", "0ef7e7dd40f8304c"}, 0x38) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0xc) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f00000000c0)=""/161, &(0x7f0000000180)=0xa1) r4 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 434.181320][T14891] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 434.189302][T14891] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 434.197385][T14891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 434.205410][T14891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 434.213449][T14891] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:42 executing program 0 (fault-call:3 fault-nth:36): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 434.429969][T15081] FAULT_INJECTION: forcing a failure. [ 434.429969][T15081] name failslab, interval 1, probability 0, space 0, times 0 [ 434.469646][T15081] CPU: 1 PID: 15081 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 434.478396][T15081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.488454][T15081] Call Trace: [ 434.491758][T15081] dump_stack+0x11d/0x181 [ 434.496118][T15081] should_fail.cold+0xa/0x1a [ 434.500796][T15081] __should_failslab+0xee/0x130 [ 434.505652][T15081] should_failslab+0x9/0x14 [ 434.510145][T15081] kmem_cache_alloc+0x29/0x5d0 [ 434.514910][T15081] ? mempool_alloc+0xa0/0x270 [ 434.519655][T15081] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 434.525972][T15081] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 434.531884][T15081] bvec_alloc+0xa5/0x1e0 [ 434.536186][T15081] bio_alloc_bioset+0x2b7/0x3e0 [ 434.541057][T15081] mpage_alloc.isra.0+0x46/0x190 [ 434.546007][T15081] do_mpage_readpage+0xb2f/0x10e0 [ 434.551231][T15081] mpage_readpages+0x2b8/0x3c0 [ 434.556031][T15081] ? constant_test_bit.constprop.0+0x20/0x20 [ 434.562072][T15081] ? blkdev_write_begin+0x60/0x60 [ 434.567124][T15081] blkdev_readpages+0x36/0x50 [ 434.571815][T15081] read_pages+0xa2/0x2d0 [ 434.576068][T15081] ? 0xffffffff81000000 02:32:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 434.580239][T15081] __do_page_cache_readahead+0x353/0x390 [ 434.585908][T15081] filemap_fault+0xe8b/0x10a0 [ 434.590641][T15081] __do_fault+0xae/0x1f0 [ 434.594881][T15081] __handle_mm_fault+0x270d/0x2e00 [ 434.603434][T15081] handle_mm_fault+0x21b/0x530 [ 434.608416][T15081] __do_page_fault+0x456/0x8d0 [ 434.613171][T15081] do_page_fault+0x38/0x194 [ 434.617724][T15081] page_fault+0x34/0x40 [ 434.621875][T15081] RIP: 0010:__get_user_4+0x21/0x30 [ 434.627227][T15081] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 434.647004][T15081] RSP: 0018:ffffc900012f3d18 EFLAGS: 00010202 [ 434.653156][T15081] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 434.661122][T15081] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 434.669077][T15081] RBP: ffffc900012f3e00 R08: ffff88809c0ab040 R09: 000088821a47b018 [ 434.677039][T15081] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 434.685173][T15081] R13: ffff8881214ae000 R14: 000000008004550f R15: ffff8881214ae010 [ 434.693140][T15081] ? usbdev_ioctl+0x1473/0x2130 [ 434.697995][T15081] ? usbdev_ioctl+0x147d/0x2130 [ 434.702863][T15081] ? proc_do_submiturb+0x1f30/0x1f30 [ 434.708137][T15081] do_vfs_ioctl+0x84f/0xcf0 [ 434.712641][T15081] ? tomoyo_file_ioctl+0x34/0x40 [ 434.718444][T15081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.724693][T15081] ksys_ioctl+0xbd/0xe0 [ 434.728873][T15081] __x64_sys_ioctl+0x4c/0x60 [ 434.733465][T15081] do_syscall_64+0xcc/0x3a0 [ 434.738170][T15081] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 434.744153][T15081] RIP: 0033:0x45a919 [ 434.748049][T15081] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.767716][T15081] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.776157][T15081] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 434.784174][T15081] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 434.792147][T15081] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 434.800332][T15081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 434.808356][T15081] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r6 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r7 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r7, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r8) 02:32:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = gettid() tkill(r2, 0x1000000000013) tkill(r2, 0x4) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xa38f, 0x101}, 0xc) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:45 executing program 0 (fault-call:3 fault-nth:37): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 436.808477][T15132] Unknown ioctl -1072409080 [ 436.815581][T15133] FAULT_INJECTION: forcing a failure. [ 436.815581][T15133] name failslab, interval 1, probability 0, space 0, times 0 [ 436.828200][T15133] CPU: 0 PID: 15133 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 436.837068][T15133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.847126][T15133] Call Trace: [ 436.849336][T15132] Unknown ioctl -2147201538 [ 436.850430][T15133] dump_stack+0x11d/0x181 [ 436.850462][T15133] should_fail.cold+0xa/0x1a [ 436.859046][T15132] Unknown ioctl 19586 [ 436.860609][T15133] __should_failslab+0xee/0x130 [ 436.860700][T15133] should_failslab+0x9/0x14 [ 436.860732][T15133] kmem_cache_alloc+0x29/0x5d0 [ 436.884050][T15133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.890346][T15133] ? radix_tree_load_root+0xba/0x100 [ 436.895637][T15133] ? __read_once_size.constprop.0+0x12/0x20 [ 436.901646][T15133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 436.907890][T15133] xas_alloc+0x208/0x240 [ 436.912252][T15133] xas_create+0x1b0/0x920 [ 436.916801][T15133] xas_store+0x9a/0xd00 [ 436.921118][T15133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.927361][T15133] ? xas_start+0x102/0x230 [ 436.931861][T15133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.938151][T15133] ? xas_load+0x5d/0x100 [ 436.942389][T15133] __add_to_page_cache_locked+0x244/0x780 [ 436.948132][T15133] ? __read_once_size.constprop.0+0x20/0x20 [ 436.954298][T15133] add_to_page_cache_lru+0xc4/0x260 [ 436.959576][T15133] mpage_readpages+0x263/0x3c0 [ 436.964377][T15133] ? constant_test_bit.constprop.0+0x20/0x20 [ 436.970356][T15133] ? blkdev_write_begin+0x60/0x60 [ 436.975501][T15133] blkdev_readpages+0x36/0x50 [ 436.980176][T15133] read_pages+0xa2/0x2d0 [ 436.984415][T15133] ? 0xffffffff81000000 [ 436.988583][T15133] __do_page_cache_readahead+0x353/0x390 [ 436.994354][T15133] filemap_fault+0xe8b/0x10a0 [ 436.999076][T15133] __do_fault+0xae/0x1f0 [ 437.003327][T15133] __handle_mm_fault+0x270d/0x2e00 [ 437.008598][T15133] handle_mm_fault+0x21b/0x530 [ 437.013375][T15133] __do_page_fault+0x456/0x8d0 [ 437.018173][T15133] do_page_fault+0x38/0x194 [ 437.022711][T15133] page_fault+0x34/0x40 [ 437.026868][T15133] RIP: 0010:__get_user_4+0x21/0x30 [ 437.032051][T15133] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 437.051783][T15133] RSP: 0018:ffffc900013e3d18 EFLAGS: 00010202 [ 437.057941][T15133] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 437.065927][T15133] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 437.074452][T15133] RBP: ffffc900013e3e00 R08: ffff88812a201000 R09: 000088821a47b018 [ 437.083504][T15133] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 437.091524][T15133] R13: ffff8881214ae000 R14: 000000008004550f R15: ffff8881214ae010 [ 437.099515][T15133] ? usbdev_ioctl+0x1473/0x2130 [ 437.104384][T15133] ? usbdev_ioctl+0x147d/0x2130 [ 437.109459][T15133] ? proc_do_submiturb+0x1f30/0x1f30 [ 437.114822][T15133] do_vfs_ioctl+0x84f/0xcf0 [ 437.119346][T15133] ? tomoyo_file_ioctl+0x34/0x40 [ 437.124274][T15133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.130633][T15133] ksys_ioctl+0xbd/0xe0 [ 437.134884][T15133] __x64_sys_ioctl+0x4c/0x60 [ 437.139480][T15133] do_syscall_64+0xcc/0x3a0 [ 437.144048][T15133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 437.149930][T15133] RIP: 0033:0x45a919 [ 437.154197][T15133] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.173808][T15133] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.182212][T15133] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 437.190334][T15133] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 437.198413][T15133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 02:32:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x22, &(0x7f0000000000), 0x0) ptrace$setopts(0x4206, r1, 0x1, 0x10) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r3, 0x80044dfe, &(0x7f0000000280)) ioctl$SNDRV_PCM_IOCTL_INFO(r3, 0x81204101, &(0x7f00000000c0)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:45 executing program 0 (fault-call:3 fault-nth:38): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 437.206379][T15133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 437.214337][T15133] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 [ 437.307089][T15141] Unknown ioctl -2147201538 [ 437.316980][T15140] Unknown ioctl -1072409080 [ 437.325852][T15141] Unknown ioctl 19586 02:32:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0xfffffdfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f00000000c0)={{0x4}, "e812d4e59263d1b17f64cae7d1d97ef8ac10b25def2742d7cf79cc74e499a8fd", 0x2}) [ 437.508953][T15155] FAULT_INJECTION: forcing a failure. [ 437.508953][T15155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 437.522235][T15155] CPU: 1 PID: 15155 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 437.530978][T15155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.541214][T15155] Call Trace: [ 437.544577][T15155] dump_stack+0x11d/0x181 [ 437.548970][T15155] should_fail.cold+0xa/0x1a [ 437.553775][T15155] should_fail_alloc_page+0x50/0x60 02:32:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) fanotify_init(0x0, 0x403) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1) 02:32:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0xfeea, r1, 0x8, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c80c}, 0x48c40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r2, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2f) fcntl$setstatus(r2, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$KVM_PPC_GET_SMMU_INFO(r4, 0x8250aea6, &(0x7f0000000140)=""/29) [ 437.558990][T15155] __alloc_pages_nodemask+0xd2/0x310 [ 437.564310][T15155] cache_grow_begin+0x76/0x5c0 [ 437.569121][T15155] ? memcg_kmem_get_cache+0x1b1/0x320 [ 437.574592][T15155] kmem_cache_alloc+0x500/0x5d0 [ 437.579541][T15155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.585812][T15155] ? radix_tree_load_root+0xba/0x100 [ 437.591161][T15155] xas_alloc+0x208/0x240 [ 437.595431][T15155] xas_create+0x1b0/0x920 [ 437.599863][T15155] xas_store+0x9a/0xd00 [ 437.604034][T15155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.610297][T15155] ? xas_start+0x102/0x230 [ 437.614807][T15155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.621136][T15155] ? xas_load+0x5d/0x100 [ 437.625392][T15155] __add_to_page_cache_locked+0x244/0x780 [ 437.631232][T15155] ? __read_once_size.constprop.0+0x20/0x20 [ 437.637180][T15155] add_to_page_cache_lru+0xc4/0x260 [ 437.642398][T15155] mpage_readpages+0x263/0x3c0 [ 437.647180][T15155] ? constant_test_bit.constprop.0+0x20/0x20 [ 437.653172][T15155] ? blkdev_write_begin+0x60/0x60 02:32:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 437.658269][T15155] blkdev_readpages+0x36/0x50 [ 437.663331][T15155] read_pages+0xa2/0x2d0 [ 437.667589][T15155] ? 0xffffffff81000000 [ 437.671973][T15155] __do_page_cache_readahead+0x353/0x390 [ 437.677632][T15155] filemap_fault+0xe8b/0x10a0 [ 437.682337][T15155] __do_fault+0xae/0x1f0 [ 437.686609][T15155] __handle_mm_fault+0x270d/0x2e00 [ 437.691843][T15155] handle_mm_fault+0x21b/0x530 [ 437.696687][T15155] __do_page_fault+0x456/0x8d0 [ 437.701480][T15155] do_page_fault+0x38/0x194 [ 437.706041][T15155] page_fault+0x34/0x40 [ 437.710216][T15155] RIP: 0010:__get_user_4+0x21/0x30 [ 437.715358][T15155] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 437.735402][T15155] RSP: 0018:ffffc9000142fd18 EFLAGS: 00010202 [ 437.741579][T15155] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 437.749659][T15155] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 437.757642][T15155] RBP: ffffc9000142fe00 R08: ffff88809c0ab040 R09: 000088821a47b018 [ 437.765662][T15155] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 437.773851][T15155] R13: ffff88812a211900 R14: 000000008004550f R15: ffff88812a211910 [ 437.781996][T15155] ? usbdev_ioctl+0x1473/0x2130 [ 437.786923][T15155] ? usbdev_ioctl+0x147d/0x2130 [ 437.791808][T15155] ? proc_do_submiturb+0x1f30/0x1f30 [ 437.797163][T15155] do_vfs_ioctl+0x84f/0xcf0 [ 437.801683][T15155] ? tomoyo_file_ioctl+0x34/0x40 [ 437.806638][T15155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.812897][T15155] ksys_ioctl+0xbd/0xe0 [ 437.817138][T15155] __x64_sys_ioctl+0x4c/0x60 [ 437.821927][T15155] do_syscall_64+0xcc/0x3a0 [ 437.826448][T15155] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 437.832369][T15155] RIP: 0033:0x45a919 [ 437.836295][T15155] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.856158][T15155] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.864602][T15155] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 437.872655][T15155] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 437.880621][T15155] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 437.888718][T15155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 437.896815][T15155] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:48 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000280)) write$P9_RLOCK(r0, &(0x7f0000000140)={0x8, 0x35, 0x2, 0x1}, 0x8) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000200)={0x6, 0xfffff801, 0x6, 0x6, 0xb, "4bbfa3a7cb28614ac3f383655659110bc4c182"}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x551800, 0x9c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2f) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x200000, 0x0) setsockopt$ax25_int(r5, 0x101, 0x9, &(0x7f0000000040)=0x8, 0x4) fcntl$setstatus(r1, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-cont\xc5\v\x00', 0x100, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:48 executing program 0 (fault-call:3 fault-nth:39): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x7f, @ipv4={[], [], @rand_addr=0xc3f1}, 0x9}}, 0xe78, 0x5}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={r1, 0x2, 0x0, 0x5, 0x10000}, &(0x7f0000000180)=0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 439.882975][T15178] Unknown ioctl -1072409080 02:32:48 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 439.915505][T15178] Unknown ioctl -2147201538 [ 439.930546][T15180] FAULT_INJECTION: forcing a failure. [ 439.930546][T15180] name failslab, interval 1, probability 0, space 0, times 0 [ 439.990445][T15180] CPU: 0 PID: 15180 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 439.999186][T15180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.009256][T15180] Call Trace: [ 440.012574][T15180] dump_stack+0x11d/0x181 [ 440.017001][T15180] should_fail.cold+0xa/0x1a [ 440.021755][T15180] ? mempool_free+0x1b0/0x1b0 [ 440.026555][T15180] __should_failslab+0xee/0x130 [ 440.031427][T15180] should_failslab+0x9/0x14 [ 440.035954][T15180] kmem_cache_alloc+0x29/0x5d0 [ 440.040782][T15180] ? _raw_spin_unlock_irq+0x68/0x80 [ 440.054343][T15180] ? finish_task_switch+0x7b/0x260 [ 440.059591][T15180] ? mempool_free+0x1b0/0x1b0 [ 440.064556][T15180] mempool_alloc_slab+0x27/0x40 [ 440.069502][T15180] mempool_alloc+0x8e/0x270 [ 440.074186][T15180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.080573][T15180] ? preempt_schedule_irq+0x72/0x90 [ 440.085969][T15180] bio_alloc_bioset+0x223/0x3e0 [ 440.090848][T15180] bio_clone_fast+0x2f/0xd0 [ 440.095600][T15180] bio_split+0x73/0x170 [ 440.099780][T15180] __blk_queue_split+0x5fd/0xc40 [ 440.104749][T15180] blk_mq_make_request+0x104/0xf60 [ 440.110043][T15180] ? blk_queue_enter+0x532/0x570 [ 440.115013][T15180] generic_make_request+0x196/0x700 [ 440.120498][T15180] ? do_mpage_readpage+0x254/0x10e0 [ 440.125910][T15180] submit_bio+0x96/0x3c0 [ 440.130512][T15180] ? guard_bio_eod+0x131/0x3b0 [ 440.135410][T15180] mpage_readpages+0x36c/0x3c0 [ 440.140260][T15180] ? constant_test_bit.constprop.0+0x20/0x20 [ 440.146471][T15180] ? blkdev_write_begin+0x60/0x60 [ 440.151597][T15180] blkdev_readpages+0x36/0x50 [ 440.156345][T15180] read_pages+0xa2/0x2d0 [ 440.160601][T15180] ? 0xffffffff81000000 [ 440.164916][T15180] __do_page_cache_readahead+0x353/0x390 [ 440.170556][T15180] filemap_fault+0xe8b/0x10a0 [ 440.175264][T15180] __do_fault+0xae/0x1f0 [ 440.179555][T15180] __handle_mm_fault+0x270d/0x2e00 [ 440.184847][T15180] handle_mm_fault+0x21b/0x530 [ 440.189641][T15180] __do_page_fault+0x456/0x8d0 [ 440.194425][T15180] do_page_fault+0x38/0x194 [ 440.198943][T15180] page_fault+0x34/0x40 [ 440.203224][T15180] RIP: 0010:__get_user_4+0x21/0x30 [ 440.208710][T15180] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 440.228922][T15180] RSP: 0018:ffffc9000161bd18 EFLAGS: 00010202 [ 440.235086][T15180] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 440.243076][T15180] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 440.251282][T15180] RBP: ffffc9000161be00 R08: ffff88812a201000 R09: 000088821a47b018 [ 440.259261][T15180] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 440.268272][T15180] R13: ffff8881214ae000 R14: 000000008004550f R15: ffff8881214ae010 [ 440.276433][T15180] ? usbdev_ioctl+0x1473/0x2130 [ 440.281499][T15180] ? usbdev_ioctl+0x147d/0x2130 [ 440.286380][T15180] ? proc_do_submiturb+0x1f30/0x1f30 [ 440.291769][T15180] do_vfs_ioctl+0x84f/0xcf0 [ 440.296316][T15180] ? tomoyo_file_ioctl+0x34/0x40 [ 440.301408][T15180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.307933][T15180] ksys_ioctl+0xbd/0xe0 [ 440.312197][T15180] __x64_sys_ioctl+0x4c/0x60 [ 440.316990][T15180] do_syscall_64+0xcc/0x3a0 [ 440.321496][T15180] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 440.327393][T15180] RIP: 0033:0x45a919 [ 440.331455][T15180] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.351639][T15180] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.360267][T15180] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 440.368237][T15180] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 440.376293][T15180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 440.384276][T15180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 02:32:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) fcntl$getown(r0, 0x9) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000000)) r2 = syz_open_dev$vcsn(&(0x7f00000006c0)='/dev/vcs#\x00', 0x8, 0xa7597b659971a1fb) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000700)=0x1, 0x4) 02:32:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 440.392272][T15180] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:49 executing program 0 (fault-call:3 fault-nth:40): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket$netlink(0x10, 0x3, 0x15) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8700}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x30, r3, 0x20, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x3f, @bearer=@l2={'ib', 0x3a, 'vcan0\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4040140}, 0x8050) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0xf8, r2, 0x4df, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, '\nci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}]}, 0xf8}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20420000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xfc, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x8040}, 0x0) [ 440.531931][T15303] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 440.543662][T15303] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 440.585254][T15306] FAULT_INJECTION: forcing a failure. [ 440.585254][T15306] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 440.598803][T15306] CPU: 0 PID: 15306 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 440.607701][T15306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.617764][T15306] Call Trace: [ 440.621095][T15306] dump_stack+0x11d/0x181 [ 440.625446][T15306] should_fail.cold+0xa/0x1a [ 440.630071][T15306] should_fail_alloc_page+0x50/0x60 [ 440.635308][T15306] __alloc_pages_nodemask+0xd2/0x310 [ 440.640647][T15306] alloc_pages_current+0xd1/0x170 [ 440.645704][T15306] pte_alloc_one+0x18/0x50 [ 440.650143][T15306] __handle_mm_fault+0x2be6/0x2e00 [ 440.655477][T15306] handle_mm_fault+0x21b/0x530 [ 440.660385][T15306] __do_page_fault+0x456/0x8d0 [ 440.665236][T15306] do_page_fault+0x38/0x194 [ 440.669759][T15306] page_fault+0x34/0x40 [ 440.673930][T15306] RIP: 0010:__get_user_4+0x21/0x30 [ 440.679179][T15306] Code: 50 ff 31 c0 0f 1f 00 c3 90 48 83 c0 03 72 5d 65 48 8b 14 25 40 8c 01 00 48 3b 82 50 0b 00 00 73 4b 48 19 d2 48 21 d0 0f 1f 00 <8b> 50 fd 31 c0 0f 1f 00 c3 66 0f 1f 44 00 00 48 83 c0 07 72 2d 65 [ 440.699642][T15306] RSP: 0018:ffffc9000161bd18 EFLAGS: 00010202 [ 440.705700][T15306] RAX: 0000000020000083 RBX: 0000000000000000 RCX: ffffc90001989000 [ 440.713735][T15306] RDX: ffffffffffffffff RSI: ffffffff831e5c93 RDI: 0000000000000001 [ 440.721837][T15306] RBP: ffffc9000161be00 R08: ffff88812a201000 R09: 000088821a47b018 [ 440.729828][T15306] R10: 0000ffff8637d5b0 R11: 000088821a47b01b R12: ffff88821a47b120 [ 440.738019][T15306] R13: ffff88809facd800 R14: 000000008004550f R15: ffff88809facd810 [ 440.746001][T15306] ? usbdev_ioctl+0x1473/0x2130 [ 440.750991][T15306] ? usbdev_ioctl+0x147d/0x2130 [ 440.755968][T15306] ? proc_do_submiturb+0x1f30/0x1f30 [ 440.761313][T15306] do_vfs_ioctl+0x84f/0xcf0 [ 440.765830][T15306] ? tomoyo_file_ioctl+0x34/0x40 [ 440.770852][T15306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.777170][T15306] ksys_ioctl+0xbd/0xe0 [ 440.781397][T15306] __x64_sys_ioctl+0x4c/0x60 [ 440.786010][T15306] do_syscall_64+0xcc/0x3a0 [ 440.790716][T15306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 440.796710][T15306] RIP: 0033:0x45a919 [ 440.800998][T15306] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.820686][T15306] RSP: 002b:00007fbc78e24c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.829090][T15306] RAX: ffffffffffffffda RBX: 00007fbc78e24c90 RCX: 000000000045a919 [ 440.837053][T15306] RDX: 0000000020000080 RSI: 000000008004550f RDI: 0000000000000003 [ 440.845083][T15306] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 440.853047][T15306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc78e256d4 [ 440.861117][T15306] R13: 00000000004c63a8 R14: 00000000004dc930 R15: 0000000000000005 02:32:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f086", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x301004, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:51 executing program 0 (fault-call:3 fault-nth:41): r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x200000, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11", 0x7e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x2a) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 02:32:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r4, 0x80044dfe, &(0x7f0000000280)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x2100830, r4, 0x0) [ 443.276452][T15345] Unknown ioctl -1072409080 [ 443.301408][T15345] Unknown ioctl -2147201538 [ 443.336663][T15345] Unknown ioctl -1072409080 [ 443.349208][T15345] Unknown ioctl -2147201538 [ 443.355005][T15345] Unknown ioctl 19586 [ 443.359845][T15345] Unknown ioctl 19584 [ 443.375974][T15345] Unknown ioctl -1072409080 [ 443.381387][T15345] Unknown ioctl -2147201538 [ 443.396059][T15449] Unknown ioctl -1072409080 [ 443.396301][T15450] Unknown ioctl -2147201538 [ 443.415661][T15450] Unknown ioctl 19584 [ 443.420721][T15449] Unknown ioctl -1072409080 [ 443.425202][T15450] Unknown ioctl -2147201538 02:32:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f086", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:54 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x1c}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000000)='\f', 0x1}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x1c}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000000)='\f', 0x34000}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 02:32:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:54 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:32:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) process_vm_writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/65, 0x41}, {&(0x7f00000000c0)=""/243, 0xf3}, {&(0x7f00000001c0)=""/110, 0x6e}, {&(0x7f0000000240)=""/60, 0x3c}], 0x4, &(0x7f0000000700)=[{&(0x7f0000000300)=""/240, 0xf0}, {&(0x7f0000000400)=""/190, 0xbe}, {&(0x7f00000004c0)=""/70, 0x46}, {&(0x7f0000000540)=""/172, 0xac}, {&(0x7f0000000600)=""/182, 0xb6}, {&(0x7f00000006c0)=""/57, 0x39}], 0x6, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000780)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f00000007c0)={{0x1, @addr=0x5}, 0x8, 0xffffffffffffffff, 0x9}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x15) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x40) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000002c0)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000140)=""/111) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYRES16], &(0x7f00000000c0)=0x2) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)=0x44ec) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000100)=r4, 0x4) 02:32:54 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000000c0)=0xc25e) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0xfffffffffffffffd) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f00000004c0)=0x1000082, 0x4) 02:32:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x800) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = timerfd_create(0x0, 0x0) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) r6 = timerfd_create(0x0, 0x0) fstat(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r7, 0x0, 0x0) r8 = gettid() tkill(r8, 0x1000000000013) r9 = gettid() tkill(r9, 0x1000000000013) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000140)={{0x3, r1, r3, r5, r7, 0x53797753e64e267c, 0x80}, 0x0, 0x0, 0x80, 0x3ff, 0xe5d, 0x400, 0x8, 0xf24, 0x3, 0x40, r8, r9}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r10, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r11 = gettid() r12 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r12, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r13 = dup3(0xffffffffffffffff, r12, 0x180000) setsockopt$inet6_buf(r13, 0x29, 0x22, &(0x7f0000000000), 0x25b) ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x2f) fcntl$setstatus(r10, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x6a, 0x7fffffff) 02:32:55 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4b67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:55 executing program 5: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock2(&(0x7f000020f000/0x2000)=nil, 0x2000, 0x0) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) 02:32:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f086", 0xbd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:32:57 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @multicast2}], 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, 0x0, &(0x7f0000002000)) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xf, 0x0, &(0x7f0000002000)) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="2323020fb618ff4c80f29c2e1c28a970142c78a97fa653f842e5769d20308e3e", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x8) write$apparmor_exec(r0, &(0x7f0000000200)={'stack ', '/dev/vga_arbiter\x00'}, 0x17) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000100)=0xfe90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={r4, 0xffff}, &(0x7f0000000080)=0x8) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 02:32:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4c00, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:57 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'veth0\x00'}) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f00000002c0)="1975b710", 0x4, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x218, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) 02:32:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4c01, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:32:57 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x2000050000}]}) r0 = socket(0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 02:32:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4c80, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:32:58 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4c81, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:32:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f00000005c0)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) 02:33:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc00800000", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:00 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5421, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff64, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x179) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:33:00 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8bab8c632414f7ca, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 02:33:00 executing program 3: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0xc35) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x90800, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:33:00 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5450, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:01 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x9, 0x1d0400) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d, 0x2}, 0x7) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x2) 02:33:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f00000000c0)="1b405189f0df2b20de7b2cddc70a383587ac15a0e33b3835a102e2e89274b8b9be7eebeeba957bb9b6657a8897c1118ade4238fbe96fac47b4b0a0918302c927506e4c7b3aff658f3cafa021b71d2ecede67dc56fb8f519e97ebe1e17423ecb124644b9388c8cf10d1142eea621b41b75241f6505912d9fa7b7a47d1eec87e070bb3", 0x82) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:01 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") r1 = socket$can_j1939(0x1d, 0x2, 0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000240)={0x1d, r3}, 0x18) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000b40), 0x18, &(0x7f0000000b80)={&(0x7f0000000100)="01", 0xdf2}}, 0x0) close(r1) 02:33:01 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5451, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc00800000", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:03 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000000)={0x1, 0x1, @raw_data=[0x200, 0x323, 0x4, 0x1, 0x6, 0x7138d50f, 0x10000, 0x8001, 0x2, 0xa4, 0xe0e, 0x0, 0x7fffffff, 0x0, 0x8, 0x40]}) 02:33:03 executing program 5: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock2(&(0x7f000020f000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000a04000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f00001b2000/0x1000)=nil) 02:33:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f00000000c0)={0x0, {0xffff, 0x7f}}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20001, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040)={0x7, r2}) r3 = gettid() tkill(r3, 0x1000000000013) tkill(r3, 0x11) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:03 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:04 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5460, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x0, 0x69, 0x20, 0x2}) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) 02:33:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/eT\x05|oop-c\x96\xf1t{ol\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r3}, 0x10) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f00000000c0)={0x7, 0x4, 0x9, 0x2, 0xffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000000) getsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 02:33:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:04 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x550b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:04 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440), 0xc, 0x0}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/133, &(0x7f0000000480)=0xfffff4f8) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r6 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r6, &(0x7f0000000140), 0xffffffffffffff68, 0x0) accept$ax25(r6, &(0x7f0000000780)={{0x3, @bcast}, [@rose, @null, @null, @netrom, @remote, @bcast, @null, @bcast]}, &(0x7f0000000700)=0x48) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000340), 0xfb, 0x0, 0xfffffffffffffcf0}, 0x26008084) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r7, 0x0, 0x2d, &(0x7f00000004c0)={0x9, {{0x2, 0x4e21, @rand_addr=0x3}}}, 0x88) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x401, 0xfffffffffffffffe]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r8 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100), 0x1) 02:33:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:07 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000280)) 02:33:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc00800000", 0xdc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:07 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5514, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x14) getpeername$netlink(r3, &(0x7f0000000180), &(0x7f00000001c0)=0xc) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x03@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x95\x00'}, &(0x7f0000000180)}) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r4) keyctl$search(0xa, r1, &(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x2}, r4) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) 02:33:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) fcntl$setstatus(r3, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:07 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000540)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r4) syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000080)="a55ac2afa8f44406f18fead0cd65aa3544550c18f258bdc04d6a58f3b4af27506f5c3ec07a99f31e67be056e4d2e3425520f0c3b1c4fe67b8e53b666b922d94848ce0e4326474c367733c509fd565ce5a2c2097a398dc70c4104b484f6d443ea525c05f52070f735ef839d1827aa9bcc728f3166897b93839cf238e6b3c6dfa16c00bfa093eaf43db25c7291ced283bc6e6c679ff5fb6b1e2f78430edd0e45b905f91579c6cab08654f0d93540263782833a55f84d4603ab6aa38533aad17ae0d815cc57d5005e3d1182a4a8c710fee46642eb80b6a75d9d91a597befdc6592285a598a1dc67aff6a3f38d", 0xeb, 0xfffffffffffffc01}, {&(0x7f0000000180)="cf56e65a61d14e4f5227b895e90797de45f019e0b3fb682c10f1c07cf30bca10434fb1986709bcb16849a44f6f5625b23257be6c079fbf655a73aa67aacd865cebd77bd49c47bc09bde83072fc8db9e5857c5d76f6a0e928c01481a77d3fa4107f1986a3b1e9e95b963d7cb049847dc41ad4742d7c57e0e76c1f36d2047b7ac16e60234ac4320a56716f1c91af9f1d857071ee6259c06eae8920e2a3e791a1193f4817f042cbbcd46de16060d8d96540650389c975e12dfa597f635e80e6", 0xbe, 0x101}, {&(0x7f0000000300)="ac161a3ad25f4ba890fb0fec510f1b47000aea633a7d27c1c93a3d7f82aecbec0cd4b8114bec5ebb8ae864d33d6bea00b3322f8707e6edd05a1e0bca1e3d080f24d8614ffddaf1208b862856b82d0d59d3eccf6e9a1a9159dc76c34ee6d0e91a8cd728c181866dae20d7a2004700ca9533756ca3d3752e78479297e93bf4c5dd847b0ce0e4f29d91625c75d6b49e1b98407969056e7c31e8b83dbcf6b4e6", 0x9e, 0x9}, {&(0x7f00000003c0)="692de79954860b158d82b64e06cc82d2bd6276d681db22de866f0b900ebc8e9210c5f513b48cc8e14f3280398a96c22b9eeabb6d6ceb004118c0799187d268b1b12ab8e96675c04bb64cc81330538423695313f20872448e7df9d7023d43d2c06475067c3fae4f3d6571264947e38cca03c6d524237fabde89f5ce0de0ab5763fa1ebbabbd77efdcf43f99bf8f90277db28c54b7f507944b807ac70ff9eb34801c5fb49b0ba560bbf87348355c5be48a53d23f678f3292fa3d61b72b4dcda8836672675a3bb3d4d08b79b12b8abc8f036c0624557e7433a5debec8", 0xdb, 0x6}, {&(0x7f0000000240)="0bdff6883bdcc83620a37155785bf94a5c60b842d038", 0x16, 0x5}], 0x2042080, &(0x7f0000000580)={[{@iocharset={'iocharset', 0x3d, 'none'}}, {@discard='discard'}, {@allow_utime={'allow_utime'}}, {@dmask={'dmask', 0x3d, 0x20}}, {@uid={'uid', 0x3d, r2}}], [{@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/loop-control\x00'}}, {@subj_role={'subj_role', 0x3d, '/dev/loop-control\x00'}}, {@dont_hash='dont_hash'}, {@uid_gt={'uid>', r4}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:33:07 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:33:07 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x551f, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r3 = gettid() tkill(r3, 0x1000000000013) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2010, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000200)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r6, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r4, 0x0, 0x1, &(0x7f00000000c0)='\x00', r7}, 0x30) write$P9_RGETLOCK(r1, &(0x7f0000000140)={0x28, 0x37, 0x2, {0x1, 0x6, 0x5, r8, 0xa, '/dev/vbi#\x00'}}, 0x28) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)={0x20002002}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:07 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', 'syz'}, 0x1b, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 02:33:07 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5521, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 458.830425][T16676] encrypted_key: keylen parameter is missing [ 458.848053][T16677] encrypted_key: keylen parameter is missing 02:33:07 executing program 5: 02:33:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e8210", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:10 executing program 3: r0 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, 0x0, &(0x7f0000002000)) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={r3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r3, 0x7fff}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000540)={r4, 0x96f0, 0x6, 0x5, 0x7, 0x10}, &(0x7f0000000580)=0x14) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg$inet(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{}, {&(0x7f0000000040)="d5b0366a13a7b2f974aea757c01f4feeabd5e01f554098a2192ada7c945878eabfc34337f654d0018227859323517e939b49bbb4e992da375d5e5e156d6eced607f3474cd2c3fb0bf59df7cee287a1f064132632a01c33a9a2be833960994547fcfb91fd2f421929a17fd0c5bf0862c7dcc837260b7ee7ebed08b66045d02a24156cbb51c2a63df76de850eb18237584e03cf825c02a841471fd5468824873e912fb097d51849ac1cbf8e4f75e6c5405f38e17bb249450f2378ffdc5575a88a367d1a3c242e51523c71c5b3e331716b3a6af7f9a8ba3d0", 0xd7}, {&(0x7f0000000140)="7473472a84f326007bf05eb0f2446401f702558e081e12273d43ffe2759c8f1a0f9a38e4eb89978c74977a50df95fdc199d580cf80a5dd4b85aa5686b6838c0278c432e6d003125ff33238deec07e8d5bcf3bf8044", 0x55}, {&(0x7f00000001c0)="0d866a25fa1f56c271ca53cb921462836e434520b4ea0794273e9fe750fbd812cf2bb9bba6039ab504ae58cfa88c46cd64a6bafdaa0e65fbd31d538cbe1776eb2a1d78934dd813bb639a8be76b48f72b746bdab94068b2790051057526406a58d0f217482282ac72a5ce13719be8ffbbe50a7863c240b4338b73d2c8b6805401f0750c29489b57b59e13435a46e4a38b1f14225be613fa8e677bb3b533ffa44c793a98c447b9b37e50b050525e3e7f197a796d9ac486dfb2b1cc409e5894320d504ba05cfd8939b7be35af715e5f55c9e2b7c4f3ebadd9038fcc9e31f362894301475fccef3010be3d5f7caf8b", 0xed}, {&(0x7f0000000300)="102ed7eb7607d2f929911d5f0bfc6b25f31a4a5a19cdf28b7cc0ce2c21f7090868ae30976b1535f2a6798029f027398907e67534293786ccc04090afbe26ab0f7de2d36bb51bb1410cc4cea7be546127edbae6539fc43840786875cb777ddab92221724995cfff994e87ec097a0691b2df5dfdb5f09dc6118e6ebfd34c2d33b1a5a3b512541820a4408755b462fffc25ed8527ac0d64fe386dec0c1810b27be6ff1fb82653e91a287a5e1ca62122addbb22a930a47d41bb1efac4cddda486c609e3ce0d6bbb4a2", 0xc7}], 0x5, &(0x7f0000000480)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}], 0x18}, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r7 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r7, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockname$inet6(r7, &(0x7f00000005c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000600)=0x1c) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) 02:33:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:10 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5522, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:10 executing program 5: 02:33:10 executing program 5: 02:33:10 executing program 5: 02:33:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:10 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5523, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xb0, r2, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdbcb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf5b2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x97}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4080}, 0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1d) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r4 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000000)={0x3ff, 0x0, {0x0, 0x3, 0x6, 0x0, 0x429c}, 0x11}) 02:33:10 executing program 5: 02:33:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e8210", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:13 executing program 5: 02:33:13 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x6364, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r1, 0x80044dfe, &(0x7f0000000280)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x8, 0x2, 0x80000000, 0x7fffffff, 0x1, "1e0fc3b323cc8b35a0e6c309dc990922811458"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)="6b450100000000000000b7f113", 0xd) ptrace$setopts(0x4206, r2, 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) tkill(r3, 0x77) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r2}) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000100)=0x3, &(0x7f0000000140)=0x2) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_rose_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 464.691446][T16733] Unknown ioctl -1072409080 02:33:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="060000000000000002004e2100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000300000002004e23ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000300000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000002004e2000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414aa00000000000000000000004000"/515], 0x210) 02:33:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:13 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8912, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 464.715279][T16733] Unknown ioctl -2147201538 [ 464.729726][T16733] Unknown ioctl 21506 02:33:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x1) 02:33:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@op={0x18, 0x29, 0xb, 0xfec00000}], 0x18}], 0x146, 0x0) [ 464.859308][T16727] cgroup: fork rejected by pids controller in /syz2 02:33:13 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8933, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e8210", 0xec}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x208001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r2, 0xc1c, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffff18}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x4000040) 02:33:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:16 executing program 5: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x0, 0x8000, 0x2000000000000002, {0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x15182c}}}) r1 = syz_open_dev$video(0x0, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f00000000c0)={0x0, 0x8, 0x2000000000000002, {0x1, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x15182c}}}) 02:33:16 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x89a0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) waitid(0x0, 0x0, 0x0, 0x40000000, &(0x7f00000000c0)) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r2 = gettid() tkill(r2, 0x1000000000013) tkill(r2, 0x20) 02:33:16 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xae01, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:16 executing program 5: perf_event_open(&(0x7f0000003040)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/ip_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) 02:33:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3000a) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f00000004c0)="e76fa1e90ca1dedc4cd16354abf037c4c4416d98919675ce035125577ab4352d3fa5bf9a3c0a1de98e8467b222466837a10f4a12870d6d7cd9d367373197cf9dcb59fefc8d16c9cc5fd8669d51ecd863b15685f63f23dbb09ac310ffadfc909d6cfaa2830e10c310dc09b8ef9ea3535d013f9934dff9b5d3a5aca062277f4b3e27c56e48e664c905e867dd358ef781b73bbf8a1056cc0e99025a9b0c96c44697b69235792c9103af9cf1f02842813ab8bbf22bd635d2a10b19abc64a75d73687d1e2b8ea793167e5da7b9f4c1652fcc89fc3cf5b99654d574034c1eebab05f0cb0157127ec3a8bc19b5667604ba87338b657975e4bf744bce465dfaa85ffd66f97", 0xba, r2}, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r5) 02:33:16 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f00000002c0)=""/11, 0x1ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) r2 = dup2(r1, r0) clone(0xf102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000000380)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) tkill(r5, 0x1000000000015) 02:33:16 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xae60, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea33", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:19 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x400454ca, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:19 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440), 0xc, 0x0}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/133, &(0x7f0000000480)=0xfffff4f8) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r6 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r6, &(0x7f0000000140), 0xffffffffffffff68, 0x0) accept$ax25(r6, &(0x7f0000000780)={{0x3, @bcast}, [@rose, @null, @null, @netrom, @remote, @bcast, @null, @bcast]}, &(0x7f0000000700)=0x48) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000340), 0xfb, 0x0, 0xfffffffffffffcf0}, 0x26008084) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r7, 0x0, 0x2d, &(0x7f00000004c0)={0x9, {{0x2, 0x4e21, @rand_addr=0x3}}}, 0x88) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x401, 0xfffffffffffffffe]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r8 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100), 0x1) 02:33:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:19 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x20000, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) 02:33:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0xffffffff, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x200000000e28a000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:19 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4004550c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:19 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440), 0xc, 0x0}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/133, &(0x7f0000000480)=0xfffff4f8) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r6 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r6, &(0x7f0000000140), 0xffffffffffffff68, 0x0) accept$ax25(r6, &(0x7f0000000780)={{0x3, @bcast}, [@rose, @null, @null, @netrom, @remote, @bcast, @null, @bcast]}, &(0x7f0000000700)=0x48) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000340), 0xfb, 0x0, 0xfffffffffffffcf0}, 0x26008084) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r7, 0x0, 0x2d, &(0x7f00000004c0)={0x9, {{0x2, 0x4e21, @rand_addr=0x3}}}, 0x88) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x401, 0xfffffffffffffffe]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r8 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100), 0x1) 02:33:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0xfffffffd, @empty, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x7cd710befbec8841, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffc, @empty}, 0xd) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f0000000000), 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = socket(0x10, 0x80002, 0xc) r3 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x635, 0x400000) ioctl$VIDIOC_G_ENC_INDEX(r3, 0x8818564c, &(0x7f00000002c0)) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x4) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000000)={0x1, 0x1, @raw_data=[0x200, 0x323, 0x4, 0x1, 0x6, 0x7138d50f, 0x10000, 0x8001, 0x2, 0xa4, 0xe0e, 0x0, 0x7fffffff, 0x0, 0x8, 0x40]}) 02:33:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea33", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:22 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000440), 0xc, 0x0}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/133, &(0x7f0000000480)=0xfffff4f8) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r6 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r6, &(0x7f0000000140), 0xffffffffffffff68, 0x0) accept$ax25(r6, &(0x7f0000000780)={{0x3, @bcast}, [@rose, @null, @null, @netrom, @remote, @bcast, @null, @bcast]}, &(0x7f0000000700)=0x48) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000340), 0xfb, 0x0, 0xfffffffffffffcf0}, 0x26008084) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r7, 0x0, 0x2d, &(0x7f00000004c0)={0x9, {{0x2, 0x4e21, @rand_addr=0x3}}}, 0x88) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x401, 0xfffffffffffffffe]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r8 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100), 0x1) 02:33:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'security#'}, {0x20, '!\'[em0vmnet1!'}, {0x20, '\xb1-.em1'}], 0xa, "b22114156589bb829305b0167d70beaedd67c210067ce661e27d66efa07cc0b0ba5c93be769a4cbe7100049434e3892a5cc793edc20ce5c84e5292711edab9c7129aa41a1a18312810cedbca53688e1deb60a573dba24abf570e76e208223b0aefa786733e898693592934df8829bc82a7b3e3be18a36da930fb1a140e34d293449d7d8bd827b3df51beac379ad99173209d9e0c541c91b994e47d133a75066e732e791393eaa5296219f0dfb6ddc26ce3dc19ad75300426dc95b2a4feb60174bd4719c1303d102eef8ad94e08a155b0453f1e96c83581d726"}, 0x103) 02:33:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000000)={0x1, 0x1, @raw_data=[0x200, 0x323, 0x4, 0x1, 0x6, 0x7138d50f, 0x10000, 0x8001, 0x2, 0xa4, 0xe0e, 0x0, 0x7fffffff, 0x0, 0x8, 0x40]}) 02:33:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4004550d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4004551e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000000)={0x1, 0x1, @raw_data=[0x200, 0x323, 0x4, 0x1, 0x6, 0x7138d50f, 0x10000, 0x8001, 0x2, 0xa4, 0xe0e, 0x0, 0x7fffffff, 0x0, 0x8, 0x40]}) 02:33:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000001c0)=0xb5, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r2, 0x7, 0x4, 0xfffffffffffffff9) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0xd87ee81dbe808fef, 0x0) write$char_usb(r3, &(0x7f0000000b00)="deeaf87553a4349d6ee1fba8ca1466ccfb52ca4dac52d74b670250c396f799d27f99fb2135a1a7e5282c90cea4312c844eccd48db01b5ef91c918b8c15c1556d607f88d7d33c0e246dd8a600ead91dd23e729ded2cba72318249ebdfcfe6a38538c6651111f7bcddbd8a2edfa7ffd84b6b5dbc9960c592c1e477ad6c03435a1cc59785cb2b9526b3e27931ea669e1175a7e581fb5ae0b1045464baf6c902a4371d3bfd6181a30e6ae80760dfea6bc0", 0xaf) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000180)={{0x4, 0x8001}, 0x22}, 0x10) ioctl$SOUND_MIXER_READ_DEVMASK(r4, 0x80044dfe, &(0x7f0000000280)) ioctl$PPPIOCGUNIT(r4, 0x80047456, &(0x7f0000000100)) tkill(r1, 0x2f) r5 = getpgid(0xffffffffffffffff) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000bc0)) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r5) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) socket$rxrpc(0x21, 0x2, 0x2) 02:33:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40049409, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 474.435513][T17586] Unknown ioctl -1072409080 [ 474.442682][T17584] Unknown ioctl -2147201538 [ 474.448081][T17584] Unknown ioctl -2147191722 02:33:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea33", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:25 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5421, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:25 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @multicast2}], 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, 0x0, &(0x7f0000002000)) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xf, 0x0, &(0x7f0000002000)) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="2323020fb618ff4c80f29c2e1c28a970142c78a97fa653f842e5769d20308e3e", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x8) write$apparmor_exec(r0, &(0x7f0000000200)={'stack ', '/dev/vga_arbiter\x00'}, 0x17) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000100)=0xfe90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={r4, 0xffff}, &(0x7f0000000080)=0x8) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 02:33:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:25 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4008550c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000280)=0xdf, 0x3) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x3, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r2}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x262001, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000380)={0x7a, 0xff, 0x6}) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r5, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0xf8, r6, 0x4df, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, '\nci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}]}, 0xf8}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000440}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r6, 0x391f60f4bb47ecd0, 0x70bd2b, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x2004004}, 0x24801) setsockopt$inet6_buf(r0, 0x29, 0xb4, &(0x7f0000000000), 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x1, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r7, 0x8983, &(0x7f0000000300)={0x2, 'bpq0\x00', {0xe09b}, 0xffd3}) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1c3800, 0x0) ioctl$PIO_FONTX(r8, 0x4b6c, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f00000000c0)=0xffffffff, 0x4) 02:33:25 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x5421, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 477.144491][T17601] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 02:33:25 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @multicast2}], 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, 0x0, &(0x7f0000002000)) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xf, 0x0, &(0x7f0000002000)) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="2323020fb618ff4c80f29c2e1c28a970142c78a97fa653f842e5769d20308e3e", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x8) write$apparmor_exec(r0, &(0x7f0000000200)={'stack ', '/dev/vga_arbiter\x00'}, 0x17) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000100)=0xfe90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={r4, 0xffff}, &(0x7f0000000080)=0x8) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 02:33:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:33:26 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @multicast2}], 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, 0x0, &(0x7f0000002000)) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xf, 0x0, &(0x7f0000002000)) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="2323020fb618ff4c80f29c2e1c28a970142c78a97fa653f842e5769d20308e3e", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000080)=0x8) write$apparmor_exec(r0, &(0x7f0000000200)={'stack ', '/dev/vga_arbiter\x00'}, 0x17) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={r7}, &(0x7f0000000100)=0xfe90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={r4, 0xffff}, &(0x7f0000000080)=0x8) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) 02:33:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 02:33:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f4", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:28 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={0x0, @ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @l2={0x1f, 0x8000, {0x78, 0x77, 0x2, 0xbe, 0x3, 0x5}, 0x3, 0x8d}, @ethernet={0x6, @random="9b720301fe41"}, 0x2, 0x0, 0x0, 0x0, 0x80, &(0x7f0000000000)='nlmon0\x00', 0x8, 0x7ff, 0x2}) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4008550d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sendto$inet6(r1, &(0x7f00000002c0)="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", 0x1000, 0x81, 0x0, 0x0) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:28 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4008b100, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f4", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:31 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40186366, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e24, 0x8, @rand_addr="6e7ff19295f89994cc77721973ba86a3", 0x4}, {0xa, 0x4e20, 0xb80, @loopback, 0x6}, 0x3, [0x80000001, 0x4, 0x8, 0x2, 0x8, 0x80, 0x9, 0x434c]}, 0x5c) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:31 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) prlimit64(r2, 0x14, &(0x7f0000000040)={0x101}, &(0x7f00000000c0)) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:32 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000280)=0x41, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) write$eventfd(r2, &(0x7f0000000000)=0x2, 0x8) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x8, @loopback, 0x3ff}, 0x1c) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) socket$inet_smc(0x2b, 0x1, 0x0) r4 = getpid() capset(&(0x7f0000000100)={0x19980330, r4}, &(0x7f0000000180)={0x7, 0xccde4c3, 0x1, 0x80, 0x8, 0x7}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x4}, @timestamp], 0x2) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 483.629498][T18508] Unknown ioctl -1072409080 [ 483.640117][T18508] Unknown ioctl -2147201538 02:33:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f4", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:34 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000280)=0x41, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) write$eventfd(r2, &(0x7f0000000000)=0x2, 0x8) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x8, @loopback, 0x3ff}, 0x1c) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) socket$inet_smc(0x2b, 0x1, 0x0) r4 = getpid() capset(&(0x7f0000000100)={0x19980330, r4}, &(0x7f0000000180)={0x7, 0xccde4c3, 0x1, 0x80, 0x8, 0x7}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:34 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x4040ae77, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:34 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x20200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = gettid() tkill(r2, 0x1000000000013) ptrace$setopts(0x4206, r2, 0x2, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000040)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0xfff, 0x1) [ 486.399376][T18521] Unknown ioctl -1072409080 [ 486.438015][T18521] Unknown ioctl -2147201538 02:33:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:35 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x41045508, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000280)=0x41, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) write$eventfd(r2, &(0x7f0000000000)=0x2, 0x8) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23, 0x8, @loopback, 0x3ff}, 0x1c) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) socket$inet_smc(0x2b, 0x1, 0x0) r4 = getpid() capset(&(0x7f0000000100)={0x19980330, r4}, &(0x7f0000000180)={0x7, 0xccde4c3, 0x1, 0x80, 0x8, 0x7}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000140)={0x7f, 0x6, 0x6, 0xfff, 0x2, 0xfffffffe}) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f00000000c0), 0x0) r3 = gettid() tkill(r3, 0x1000000000013) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)=')]/selfvboxnet0\x00'}, 0x30) ptrace$setopts(0x4206, r4, 0xffffffff7fefffff, 0x40) tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f00000000c0)=0x5, 0x4) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2880e0, 0x0) ioctl$TIOCGETD(r6, 0x5424, &(0x7f00000001c0)) 02:33:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 486.711888][T18643] Unknown ioctl -1072409080 [ 486.749834][T18643] Unknown ioctl -2147201538 02:33:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100080, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000080)=0x3) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x1}, 0xb) 02:33:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x800454d2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:38 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) write$P9_RWALK(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="6400004905024f694b2991006f020007000001000000040000000000000020040000000800800000000000200200000004000000000000004003000000010000000000000010000000000000000000000000010100000005000000000000000004000000"], 0x64) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000002c0)={0x4, 0x7, 0xc, 0x8000, 0xfffffe00, 0xe2dd, 0x400, 0x8000, 0x0}, &(0x7f0000000300)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000340)={r4, 0x9e, "4bbf2c38194dd77bb4a0611e4b5d0d70e8bfd9255273e53cee73c2b2bb68243cc84baa140463b8de1121e4183bebb95dfe133d0bc78bc9dbbca85aac9b6c6d582d874e88a503203b173b38b533ea53bde04a4d57996e5e9eb0c8851e16ed6b43d96c5424adb4b333cbefa9de61054f1941d9c9549206b4e4de4bf1b8aea0373c70fcbb0750e790bb8ecf838a638ea117a9eb3fee35064e3f93a2467efa47"}, &(0x7f0000000400)=0xa6) setsockopt$SO_J1939_SEND_PRIO(0xffffffffffffffff, 0x6b, 0x3, &(0x7f0000000440)=0x2, 0x4) r5 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r5, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000140)=0x5) socket$inet(0x2, 0x800, 0x1) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e22, @rand_addr=0x2}, {0x6, @random="a309ac4407b9"}, 0x30, {0x2, 0x4e23, @empty}, 'syz_tun\x00'}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x48100, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r6, 0x8004550f, &(0x7f0000000200)=0x1) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:38 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045502, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100080, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000080)=0x3) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x1}, 0xb) 02:33:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0xfffffffffffffdb4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000240)={0xc, 0x1, &(0x7f0000000180)="efd596a7097c803da95ca0841129c26beaa5bea919d2768afd55812f21c4438dceea5c0f808ddafd115a840c02e6964d68a3871a147f45ad697ba1a8d4ea27543e3c0a1d2fecd9c84132aabb044614352af74f4cc28c35fc69b962e3f6a9f5afa9a5cc9b60192e72b4fc408366dfce20939b1f4b0a49f6d0add557185f630782c019", {0x1, 0x2, 0x41564e57, 0x1, 0x5, 0x2, 0xc, 0x100000}}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e21, @remote}, 0x208, 0x0, 0x0, 0x0, 0x8, 0x0, 0xaf, 0x3, 0x200}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000040)) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r5 = gettid() tkill(r5, 0x1000000000013) ptrace$cont(0xe, r5, 0x59, 0x9) fcntl$setstatus(r0, 0x4, 0x6e98a200a90c62d) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) 02:33:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:38 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 489.822821][T18977] Unknown ioctl -1072409080 02:33:38 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045503, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 489.846352][T18984] Unknown ioctl -1072409080 [ 489.858096][T18977] Unknown ioctl -2147201538 [ 489.880377][T18984] Unknown ioctl -2147201538 [ 489.891055][T18984] Unknown ioctl -2144053727 02:33:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:41 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="24000000320099010000000000000000040000302fad929b0c00010006000600894f0000"], 0x24}}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) socket(0x10, 0x2, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000240)=0xfffffffffffffffb) setfsuid(r4) ioctl$TUNSETOWNER(r2, 0x400454cc, r4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x2f) fcntl$setstatus(r1, 0x4, 0x80000000002c00) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c, 0x80000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={r6}) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1000, 0x0) ioctl$PIO_FONTX(r7, 0x4b6c, 0x0) 02:33:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0xfdfdffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:41 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 492.663770][T19009] openvswitch: netlink: Missing key (keys=40, expected=10000000) 02:33:41 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:41 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045505, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000013c0)=0xffffffffffffffff, 0x4) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:41 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0xc0101282, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 492.913917][T19123] usb usb7: usbfs: interface 0 claimed by hub while 'syz-executor.0' sets config #0 02:33:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0xfffffdfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:44 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045506, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:44 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:44 executing program 5 (fault-call:5 fault-nth:0): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:33:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) setsockopt$inet6_buf(r2, 0x29, 0xb4881ee0915d851, &(0x7f0000000000), 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000013) tkill(r3, 0x3c) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:44 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045507, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:44 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 495.841632][T19247] FAULT_INJECTION: forcing a failure. [ 495.841632][T19247] name failslab, interval 1, probability 0, space 0, times 0 02:33:44 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 495.932435][T19247] CPU: 1 PID: 19247 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 495.941170][T19247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.951226][T19247] Call Trace: [ 495.954539][T19247] dump_stack+0x11d/0x181 [ 495.958964][T19247] should_fail.cold+0xa/0x1a [ 495.963594][T19247] __should_failslab+0xee/0x130 [ 495.968454][T19247] should_failslab+0x9/0x14 [ 495.972970][T19247] __kmalloc_track_caller+0x4f/0x690 [ 495.978328][T19247] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 495.984233][T19247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 495.990498][T19247] ? __this_cpu_preempt_check+0x45/0x140 [ 495.996148][T19247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 496.002400][T19247] ? strndup_user+0x85/0xc0 [ 496.006930][T19247] memdup_user+0x2f/0xc0 [ 496.011184][T19247] strndup_user+0x85/0xc0 [ 496.015593][T19247] ksys_mount+0x45/0x160 [ 496.019846][T19247] __x64_sys_mount+0x70/0x90 [ 496.024451][T19247] do_syscall_64+0xcc/0x3a0 02:33:44 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 496.029048][T19247] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 496.034938][T19247] RIP: 0033:0x45a919 [ 496.038946][T19247] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.058603][T19247] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 496.067016][T19247] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 496.074984][T19247] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 02:33:44 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 496.083059][T19247] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 496.091122][T19247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 496.099097][T19247] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:33:44 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045508, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:47 executing program 5 (fault-call:5 fault-nth:1): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:33:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:47 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:47 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045509, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 498.928501][T19381] FAULT_INJECTION: forcing a failure. [ 498.928501][T19381] name failslab, interval 1, probability 0, space 0, times 0 [ 498.987305][T19381] CPU: 0 PID: 19381 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 498.996016][T19381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.006073][T19381] Call Trace: [ 499.009505][T19381] dump_stack+0x11d/0x181 [ 499.013855][T19381] should_fail.cold+0xa/0x1a [ 499.018458][T19381] __should_failslab+0xee/0x130 [ 499.023376][T19381] should_failslab+0x9/0x14 [ 499.027914][T19381] kmem_cache_alloc_trace+0x2a/0x5d0 02:33:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @rand_addr, 0x0}, &(0x7f0000000040)=0xc) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f00000000c0)={@remote, r3}, 0x14) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 499.033207][T19381] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 499.038933][T19381] ? __check_object_size+0x5f/0x346 [ 499.044141][T19381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.050464][T19381] ? _copy_from_user+0x98/0xf0 [ 499.055393][T19381] copy_mount_options+0x52/0x2a0 [ 499.060390][T19381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 499.066644][T19381] ksys_mount+0xb0/0x160 [ 499.071007][T19381] __x64_sys_mount+0x70/0x90 [ 499.075660][T19381] do_syscall_64+0xcc/0x3a0 [ 499.080262][T19381] entry_SYSCALL_64_after_hwframe+0x44/0xa9 02:33:47 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 499.086319][T19381] RIP: 0033:0x45a919 [ 499.090268][T19381] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.110310][T19381] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 499.119761][T19381] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 499.127789][T19381] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 02:33:47 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 499.136230][T19381] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 499.144206][T19381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 499.152201][T19381] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:33:47 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:47 executing program 5 (fault-call:5 fault-nth:2): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:33:47 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 499.403082][T19607] FAULT_INJECTION: forcing a failure. [ 499.403082][T19607] name failslab, interval 1, probability 0, space 0, times 0 [ 499.435601][T19607] CPU: 1 PID: 19607 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 499.444368][T19607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.454573][T19607] Call Trace: [ 499.457858][T19607] dump_stack+0x11d/0x181 [ 499.462209][T19607] should_fail.cold+0xa/0x1a [ 499.466798][T19607] __should_failslab+0xee/0x130 [ 499.471699][T19607] should_failslab+0x9/0x14 [ 499.476352][T19607] kmem_cache_alloc+0x29/0x5d0 [ 499.481152][T19607] ? __schedule+0x30e/0x690 [ 499.485649][T19607] getname_flags+0x91/0x380 [ 499.490150][T19607] user_path_at_empty+0x38/0x70 [ 499.495064][T19607] do_mount+0xc8/0x14f0 [ 499.499356][T19607] ? copy_mount_options+0x200/0x2a0 [ 499.504572][T19607] ksys_mount+0xe8/0x160 [ 499.508825][T19607] __x64_sys_mount+0x70/0x90 [ 499.513412][T19607] do_syscall_64+0xcc/0x3a0 [ 499.518228][T19607] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 499.524099][T19607] RIP: 0033:0x45a919 [ 499.528013][T19607] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 499.548366][T19607] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 499.556817][T19607] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 499.566354][T19607] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 499.574417][T19607] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 499.582494][T19607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 499.590451][T19607] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:33:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000004c0)=[@mss={0x2, 0x3}, @mss={0x2, 0xfffffffa}], 0x2) clone(0x2000000002069100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x8, 0x0}, @in=@local, 0x4e23, 0x7fff, 0x4e24, 0x0, 0xa, 0x0, 0x20, 0x6, 0x0, r3}, {0x4, 0x364, 0xffffffffffffffff, 0x0, 0x1, 0x1fc0000000000, 0xfffffffffffffffa, 0x1}, {0x1000, 0xcb, 0x10001, 0xffff}, 0x5, 0x6e6bba, 0x3, 0x0, 0x4, 0x1}, {{@in6=@mcast1, 0x4d5, 0x6c}, 0xa, @in6=@empty, 0x3501, 0x0, 0x1, 0x4d, 0x8001, 0x2, 0xb15}}, 0xe8) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$TCXONC(r4, 0x540a, 0x7) tkill(r1, 0x2f) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@initdev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x126000, 0x0) ioctl$CAPI_REGISTER(r5, 0x400c4301, &(0x7f00000001c0)={0x3, 0x2575069c, 0x701f}) 02:33:50 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:50 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:50 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:50 executing program 5 (fault-call:5 fault-nth:3): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 502.092953][T19625] FAULT_INJECTION: forcing a failure. [ 502.092953][T19625] name failslab, interval 1, probability 0, space 0, times 0 [ 502.120591][T19625] CPU: 0 PID: 19625 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 502.129320][T19625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.139374][T19625] Call Trace: [ 502.142684][T19625] dump_stack+0x11d/0x181 [ 502.147039][T19625] should_fail.cold+0xa/0x1a [ 502.151704][T19625] __should_failslab+0xee/0x130 [ 502.156656][T19625] should_failslab+0x9/0x14 [ 502.161263][T19625] __kmalloc+0x53/0x690 [ 502.165420][T19625] ? __follow_mount_rcu.isra.0+0x220/0x310 [ 502.171256][T19625] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 502.183591][T19625] ? tomoyo_encode2.part.0+0xd9/0x260 [ 502.188991][T19625] tomoyo_encode2.part.0+0xd9/0x260 [ 502.194195][T19625] tomoyo_encode+0x34/0x50 [ 502.198626][T19625] tomoyo_mount_acl+0x7b/0x590 [ 502.203396][T19625] ? dput+0xab/0x750 [ 502.207462][T19625] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 502.213701][T19625] ? ___cache_free+0x2e/0x320 [ 502.218396][T19625] ? terminate_walk+0x1d0/0x250 [ 502.223243][T19625] ? complete_walk+0xd9/0x170 [ 502.227947][T19625] tomoyo_mount_permission+0xef/0x350 [ 502.233350][T19625] tomoyo_sb_mount+0x3e/0x60 [ 502.238007][T19625] security_sb_mount+0x81/0xc0 [ 502.242775][T19625] do_mount+0x129/0x14f0 [ 502.247023][T19625] ksys_mount+0xe8/0x160 [ 502.251376][T19625] __x64_sys_mount+0x70/0x90 [ 502.256016][T19625] do_syscall_64+0xcc/0x3a0 [ 502.260604][T19625] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 502.266487][T19625] RIP: 0033:0x45a919 [ 502.270386][T19625] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:33:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) tkill(r2, 0x2f) r4 = dup(0xffffffffffffffff) write$UHID_CREATE2(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea7594000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050007000000060000006e0c000000000000"], 0x118) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:50 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:50 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 502.290003][T19625] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 502.298457][T19625] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 502.306421][T19625] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 502.314444][T19625] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 502.322709][T19625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 502.330675][T19625] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:33:51 executing program 5 (fault-call:5 fault-nth:4): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:33:51 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 502.592448][T19645] FAULT_INJECTION: forcing a failure. [ 502.592448][T19645] name failslab, interval 1, probability 0, space 0, times 0 [ 502.629180][T19645] CPU: 0 PID: 19645 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 502.637916][T19645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.647975][T19645] Call Trace: [ 502.651277][T19645] dump_stack+0x11d/0x181 [ 502.655628][T19645] should_fail.cold+0xa/0x1a [ 502.660227][T19645] __should_failslab+0xee/0x130 [ 502.665084][T19645] should_failslab+0x9/0x14 [ 502.669592][T19645] __kmalloc+0x53/0x690 [ 502.673746][T19645] ? __kmalloc+0x239/0x690 [ 502.678196][T19645] ? __follow_mount_rcu.isra.0+0x220/0x310 [ 502.684079][T19645] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 502.689985][T19645] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 502.695720][T19645] tomoyo_realpath_from_path+0x83/0x4c0 [ 502.701357][T19645] tomoyo_mount_acl+0xdd/0x590 [ 502.706117][T19645] ? dput+0xab/0x750 [ 502.710013][T19645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 502.716293][T19645] ? ___cache_free+0x2e/0x320 [ 502.720999][T19645] ? terminate_walk+0x1d0/0x250 [ 502.725858][T19645] ? complete_walk+0xd9/0x170 [ 502.730547][T19645] tomoyo_mount_permission+0xef/0x350 [ 502.736057][T19645] tomoyo_sb_mount+0x3e/0x60 [ 502.740672][T19645] security_sb_mount+0x81/0xc0 [ 502.745549][T19645] do_mount+0x129/0x14f0 [ 502.749850][T19645] ksys_mount+0xe8/0x160 [ 502.754097][T19645] __x64_sys_mount+0x70/0x90 [ 502.758692][T19645] do_syscall_64+0xcc/0x3a0 [ 502.763296][T19645] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 502.769184][T19645] RIP: 0033:0x45a919 [ 502.773146][T19645] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.792837][T19645] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 502.801286][T19645] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 502.809319][T19645] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 502.817301][T19645] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 502.825410][T19645] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 502.833411][T19645] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 [ 502.860648][T19645] ERROR: Out of memory at tomoyo_realpath_from_path. 02:33:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffe, @local}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sendmsg$sock(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="3390c1656da50598af11c2c0e941f3a4a378a6f3770e545975ad9469a0154e3760aad86d671f5b3fcbf0", 0x2a}, {&(0x7f0000000100)="8aa27901b2232baa8f8cfa8e13ab55727bcdc02ecdede6479a2795cfa755b1ddf149f6d2c0d58dc2428c245b", 0x3c3}, {&(0x7f0000000140)="b563af47db7e785f586e3aaee7fe071da8bed2be3e0362b94fcf4b4bc1445559e8dbb0a03d3104305108c71c020d4bf1bdd4a5e8c2ad141fe3655a989fd6dcb8c20c5268e9ef07bca81697b00bebd15c4e89173b6f60a0cceb4db72689ad7e8c622c6776de5ba5844a5ea2661c0d3bc7", 0x70}, {&(0x7f00000002c0)="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", 0x1000}], 0x4, &(0x7f00000012c0)=[@timestamping={{0x14, 0x1, 0x25, 0x9e}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18}}, @txtime={{0x0, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0xfffffff8}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0x90}, 0x50) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:53 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:53 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:53 executing program 5 (fault-call:5 fault-nth:5): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:33:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000000)=@dstopts={0x0, 0x4, [], [@hao={0xc9, 0x10, @rand_addr="c07e77ae6df454c3768f03f526246d33"}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}, 0x28) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:53 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004550e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 505.159893][T19671] FAULT_INJECTION: forcing a failure. [ 505.159893][T19671] name failslab, interval 1, probability 0, space 0, times 0 [ 505.191969][T19671] CPU: 0 PID: 19671 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 505.200706][T19671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.210762][T19671] Call Trace: [ 505.214068][T19671] dump_stack+0x11d/0x181 [ 505.218423][T19671] should_fail.cold+0xa/0x1a [ 505.223053][T19671] __should_failslab+0xee/0x130 [ 505.228700][T19671] should_failslab+0x9/0x14 [ 505.233306][T19671] __kmalloc+0x53/0x690 [ 505.237552][T19671] ? delay_tsc+0x8f/0xc0 [ 505.241866][T19671] ? __const_udelay+0x36/0x40 [ 505.246556][T19671] ? __udelay+0x10/0x20 [ 505.250715][T19671] ? tomoyo_encode2.part.0+0xd9/0x260 02:33:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000000)={0x2d, 0x401, 0x60e02e58}) [ 505.256180][T19671] tomoyo_encode2.part.0+0xd9/0x260 [ 505.261405][T19671] tomoyo_encode+0x34/0x50 [ 505.265893][T19671] tomoyo_realpath_from_path+0x14a/0x4c0 [ 505.271550][T19671] tomoyo_mount_acl+0xdd/0x590 [ 505.276326][T19671] ? dput+0xab/0x750 [ 505.280298][T19671] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 505.289248][T19671] ? ___cache_free+0x2e/0x320 [ 505.293935][T19671] ? terminate_walk+0x1d0/0x250 [ 505.298838][T19671] ? complete_walk+0xd9/0x170 [ 505.303586][T19671] tomoyo_mount_permission+0xef/0x350 [ 505.308980][T19671] tomoyo_sb_mount+0x3e/0x60 [ 505.313579][T19671] security_sb_mount+0x81/0xc0 [ 505.318357][T19671] do_mount+0x129/0x14f0 [ 505.322641][T19671] ksys_mount+0xe8/0x160 [ 505.327078][T19671] __x64_sys_mount+0x70/0x90 [ 505.331684][T19671] do_syscall_64+0xcc/0x3a0 [ 505.336236][T19671] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 505.342127][T19671] RIP: 0033:0x45a919 02:33:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r5 = dup3(r3, r4, 0x80000) sendmsg(r2, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e22, @remote}, 0x4, 0x2, 0x1}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=[{0x1010, 0x113, 0x2, "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"}], 0x1010}, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 505.346038][T19671] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 505.373370][T19671] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 505.381817][T19671] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 505.389829][T19671] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 505.397908][T19671] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 02:33:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 505.405884][T19671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 505.413862][T19671] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 [ 505.526532][T19671] ERROR: Out of memory at tomoyo_realpath_from_path. 02:33:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:33:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000000)={0x5, [0x6, 0x52, 0x9, 0x8000, 0x1f]}, 0xe) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x112081, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r3, 0x8982, &(0x7f00000000c0)) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:33:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045510, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:57 executing program 5 (fault-call:5 fault-nth:6): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:33:57 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:33:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045514, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 508.624214][T19714] FAULT_INJECTION: forcing a failure. [ 508.624214][T19714] name failslab, interval 1, probability 0, space 0, times 0 [ 508.676335][T19714] CPU: 1 PID: 19714 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 508.685056][T19714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.695189][T19714] Call Trace: [ 508.698495][T19714] dump_stack+0x11d/0x181 [ 508.702898][T19714] should_fail.cold+0xa/0x1a [ 508.707507][T19714] __should_failslab+0xee/0x130 [ 508.712370][T19714] should_failslab+0x9/0x14 [ 508.716907][T19714] __kmalloc+0x53/0x690 [ 508.721130][T19714] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 508.726902][T19714] ? strncmp+0x66/0x80 [ 508.731045][T19714] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 508.737641][T19714] ? tomoyo_encode2.part.0+0xd9/0x260 [ 508.743030][T19714] tomoyo_encode2.part.0+0xd9/0x260 [ 508.748366][T19714] ? __get_fs_type+0x85/0xa0 [ 508.752983][T19714] tomoyo_encode+0x34/0x50 [ 508.757580][T19714] tomoyo_mount_acl+0x299/0x590 [ 508.762485][T19714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 508.768731][T19714] ? ___cache_free+0x2e/0x320 [ 508.773518][T19714] ? terminate_walk+0x1d0/0x250 [ 508.778381][T19714] tomoyo_mount_permission+0xef/0x350 [ 508.783806][T19714] tomoyo_sb_mount+0x3e/0x60 [ 508.788416][T19714] security_sb_mount+0x81/0xc0 [ 508.793310][T19714] do_mount+0x129/0x14f0 [ 508.797556][T19714] ksys_mount+0xe8/0x160 [ 508.801947][T19714] __x64_sys_mount+0x70/0x90 [ 508.806539][T19714] do_syscall_64+0xcc/0x3a0 [ 508.811058][T19714] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 508.816951][T19714] RIP: 0033:0x45a919 [ 508.820850][T19714] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.840522][T19714] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 508.849009][T19714] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 508.856994][T19714] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 508.864980][T19714] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 02:33:57 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:33:57 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045515, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 508.872956][T19714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 508.880931][T19714] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:33:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x5142, 0x0) personality(0x800000) recvfrom$ax25(r2, &(0x7f00000000c0)=""/240, 0xf0, 0x0, &(0x7f00000001c0)={{0x3, @null, 0x6}, [@bcast, @null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}, 0x48) r3 = open(&(0x7f0000000240)='.\x00', 0x0, 0x100) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000380)=0x8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) mq_unlink(&(0x7f0000000040)='\x00') 02:33:57 executing program 5 (fault-call:5 fault-nth:7): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:33:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 509.160445][T19933] FAULT_INJECTION: forcing a failure. [ 509.160445][T19933] name failslab, interval 1, probability 0, space 0, times 0 [ 509.173521][T19933] CPU: 0 PID: 19933 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 509.182297][T19933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.192359][T19933] Call Trace: [ 509.195680][T19933] dump_stack+0x11d/0x181 [ 509.200029][T19933] should_fail.cold+0xa/0x1a [ 509.204683][T19933] __should_failslab+0xee/0x130 [ 509.209552][T19933] should_failslab+0x9/0x14 [ 509.214103][T19933] kmem_cache_alloc_trace+0x2a/0x5d0 [ 509.219375][T19933] ? apparmor_capable+0x260/0x470 [ 509.224441][T19933] ? strncmp+0x66/0x80 [ 509.228534][T19933] alloc_fs_context+0x58/0x3d0 [ 509.233313][T19933] ? _raw_read_unlock+0x34/0x50 [ 509.238184][T19933] fs_context_for_mount+0x2e/0x40 [ 509.243226][T19933] do_mount+0xe52/0x14f0 [ 509.247477][T19933] ? __tsan_unaligned_write1+0x84/0x100 [ 509.253094][T19933] ksys_mount+0xe8/0x160 [ 509.257349][T19933] __x64_sys_mount+0x70/0x90 [ 509.262003][T19933] do_syscall_64+0xcc/0x3a0 [ 509.266538][T19933] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 509.272548][T19933] RIP: 0033:0x45a919 [ 509.276452][T19933] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 509.296207][T19933] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 509.304623][T19933] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 509.312623][T19933] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 509.320881][T19933] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 509.328876][T19933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 509.336831][T19933] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:00 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045518, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) getgroups(0x2, &(0x7f00000000c0)=[r1, r2]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f0000000280)=0x7, 0x47b02419b5905f0b) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_buf(r3, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2f) fcntl$setstatus(r3, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:00 executing program 5 (fault-call:5 fault-nth:8): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 511.648585][T19948] FAULT_INJECTION: forcing a failure. [ 511.648585][T19948] name failslab, interval 1, probability 0, space 0, times 0 [ 511.675041][T19948] CPU: 0 PID: 19948 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 511.683772][T19948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.693829][T19948] Call Trace: [ 511.697126][T19948] dump_stack+0x11d/0x181 [ 511.701468][T19948] should_fail.cold+0xa/0x1a [ 511.706136][T19948] __should_failslab+0xee/0x130 [ 511.711001][T19948] should_failslab+0x9/0x14 [ 511.715518][T19948] kmem_cache_alloc_trace+0x2a/0x5d0 [ 511.720827][T19948] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 511.726424][T19948] ? apparmor_capable+0x260/0x470 [ 511.731457][T19948] legacy_init_fs_context+0x3a/0x80 [ 511.736721][T19948] ? generic_parse_monolithic+0x160/0x160 [ 511.742447][T19948] alloc_fs_context+0x2c5/0x3d0 [ 511.747315][T19948] fs_context_for_mount+0x2e/0x40 [ 511.752366][T19948] do_mount+0xe52/0x14f0 [ 511.756619][T19948] ksys_mount+0xe8/0x160 [ 511.760875][T19948] __x64_sys_mount+0x70/0x90 [ 511.765468][T19948] do_syscall_64+0xcc/0x3a0 [ 511.771460][T19948] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 511.777555][T19948] RIP: 0033:0x45a919 [ 511.781662][T19948] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.801269][T19948] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 511.809855][T19948] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 511.817872][T19948] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 511.825962][T19948] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 511.833939][T19948] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 02:34:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 511.841913][T19948] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(0xffffffffffffffff, 0x80044dfe, &(0x7f0000000280)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000000)=""/109) 02:34:00 executing program 5 (fault-call:5 fault-nth:9): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 512.127103][T19973] FAULT_INJECTION: forcing a failure. [ 512.127103][T19973] name failslab, interval 1, probability 0, space 0, times 0 [ 512.139927][T19973] CPU: 0 PID: 19973 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 512.148758][T19973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.158848][T19973] Call Trace: [ 512.162169][T19973] dump_stack+0x11d/0x181 [ 512.166540][T19973] should_fail.cold+0xa/0x1a [ 512.171201][T19973] __should_failslab+0xee/0x130 [ 512.176122][T19973] should_failslab+0x9/0x14 [ 512.180702][T19973] kmem_cache_alloc_trace+0x2a/0x5d0 [ 512.186000][T19973] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 512.191569][T19973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.197944][T19973] ? apparmor_capable+0x260/0x470 [ 512.202975][T19973] v9fs_mount+0x54/0x620 [ 512.207236][T19973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 512.213532][T19973] ? security_capable+0x92/0xb0 [ 512.218423][T19973] ? v9fs_write_inode+0x60/0x60 [ 512.223301][T19973] legacy_get_tree+0x7e/0xf0 [ 512.227945][T19973] vfs_get_tree+0x56/0x1a0 [ 512.232374][T19973] do_mount+0x1004/0x14f0 [ 512.236883][T19973] ksys_mount+0xe8/0x160 [ 512.241190][T19973] __x64_sys_mount+0x70/0x90 [ 512.245868][T19973] do_syscall_64+0xcc/0x3a0 [ 512.250387][T19973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 512.256306][T19973] RIP: 0033:0x45a919 [ 512.260201][T19973] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 512.281117][T19973] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 512.289535][T19973] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 512.297496][T19973] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 512.305471][T19973] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 512.313556][T19973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 512.321701][T19973] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:03 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80045519, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, 0x0) 02:34:03 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:03 executing program 5 (fault-call:5 fault-nth:10): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:03 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 514.797272][T19988] FAULT_INJECTION: forcing a failure. [ 514.797272][T19988] name failslab, interval 1, probability 0, space 0, times 0 [ 514.830012][T19988] CPU: 0 PID: 19988 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 514.838987][T19988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.849046][T19988] Call Trace: [ 514.852390][T19988] dump_stack+0x11d/0x181 [ 514.856742][T19988] should_fail.cold+0xa/0x1a [ 514.861366][T19988] __should_failslab+0xee/0x130 [ 514.866407][T19988] should_failslab+0x9/0x14 [ 514.870933][T19988] __kmalloc_track_caller+0x4f/0x690 [ 514.876233][T19988] ? v9fs_session_init+0x57/0xf10 [ 514.881356][T19988] kstrdup+0x43/0x80 [ 514.885262][T19988] v9fs_session_init+0x57/0xf10 [ 514.890246][T19988] ? should_fail+0xd4/0x45d [ 514.894771][T19988] ? __write_once_size.constprop.0+0x12/0x20 [ 514.900767][T19988] ? memcg_kmem_put_cache+0x7c/0xc0 [ 514.905975][T19988] ? debug_smp_processor_id+0x43/0x137 [ 514.911452][T19988] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 514.917081][T19988] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 514.922637][T19988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.928887][T19988] v9fs_mount+0x73/0x620 [ 514.933206][T19988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 514.939572][T19988] ? security_capable+0x92/0xb0 02:34:03 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 514.944433][T19988] ? v9fs_write_inode+0x60/0x60 [ 514.949290][T19988] legacy_get_tree+0x7e/0xf0 [ 514.953893][T19988] vfs_get_tree+0x56/0x1a0 [ 514.958439][T19988] do_mount+0x1004/0x14f0 [ 514.962848][T19988] ksys_mount+0xe8/0x160 [ 514.967098][T19988] __x64_sys_mount+0x70/0x90 [ 514.971750][T19988] do_syscall_64+0xcc/0x3a0 [ 514.976274][T19988] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 514.982166][T19988] RIP: 0033:0x45a919 02:34:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r4, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x48, r7, 0x101, 0x80000000, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x48}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000013c0)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRES16=0x0, @ANYRESOCT=r4, @ANYRES64=r5, @ANYRESHEX=r7], &(0x7f000095dffc)=0x6) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18020000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r4, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x36}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8001}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x8080) tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vhost-net\x00', 0x2, 0x0) r9 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") dup2(r8, r9) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 514.986139][T19988] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.005746][T19988] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 515.014159][T19988] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 515.022194][T19988] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 515.030174][T19988] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 515.038343][T19988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 02:34:03 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004551a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 515.046333][T19988] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:03 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x40085511, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 515.145535][T20099] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 515.179149][T20099] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 02:34:06 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8004555d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:06 executing program 5 (fault-call:5 fault-nth:11): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:06 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x40085511, 0x0) 02:34:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000007, 0x11, 0xffffffffffffffff, 0xc9c3d000) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3000a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 02:34:06 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@data_ordered='data=ordered', 0x3d}]}) [ 517.912989][T20223] FAULT_INJECTION: forcing a failure. [ 517.912989][T20223] name failslab, interval 1, probability 0, space 0, times 0 [ 517.967978][T20223] CPU: 0 PID: 20223 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 517.976703][T20223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.986762][T20223] Call Trace: [ 517.990129][T20223] dump_stack+0x11d/0x181 [ 517.994550][T20223] should_fail.cold+0xa/0x1a [ 517.999155][T20223] __should_failslab+0xee/0x130 [ 518.004106][T20223] should_failslab+0x9/0x14 [ 518.008626][T20223] __kmalloc_track_caller+0x4f/0x690 [ 518.014026][T20223] ? v9fs_session_init+0x85/0xf10 [ 518.019052][T20223] kstrdup+0x43/0x80 [ 518.023022][T20223] v9fs_session_init+0x85/0xf10 [ 518.027927][T20223] ? should_fail+0xd4/0x45d [ 518.032495][T20223] ? __write_once_size.constprop.0+0x12/0x20 [ 518.038510][T20223] ? memcg_kmem_put_cache+0x7c/0xc0 [ 518.043777][T20223] ? debug_smp_processor_id+0x43/0x137 [ 518.049236][T20223] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 518.054866][T20223] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 518.060530][T20223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.066899][T20223] v9fs_mount+0x73/0x620 [ 518.071153][T20223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.077441][T20223] ? security_capable+0x92/0xb0 [ 518.082293][T20223] ? v9fs_write_inode+0x60/0x60 [ 518.087153][T20223] legacy_get_tree+0x7e/0xf0 [ 518.091774][T20223] vfs_get_tree+0x56/0x1a0 [ 518.096205][T20223] do_mount+0x1004/0x14f0 [ 518.100603][T20223] ksys_mount+0xe8/0x160 [ 518.104846][T20223] __x64_sys_mount+0x70/0x90 [ 518.109514][T20223] do_syscall_64+0xcc/0x3a0 [ 518.114021][T20223] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 518.119910][T20223] RIP: 0033:0x45a919 [ 518.123808][T20223] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.143414][T20223] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 518.151819][T20223] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 518.159784][T20223] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 02:34:06 executing program 3: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="66ba4100ec0f20e035002000000f22e00f7ef2f2e0000fc77a9d8fe96091ad5200000064f30fc7b70f00000066b83c010f00d0ea7b5549161c00f0312407", 0x125}], 0xabb4cbfa6006e1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$audio(0xffffffffffffff9c, 0x0, 0x140202, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x40184152, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce, 0x20000000000000], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:34:06 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80085504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 518.167747][T20223] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 518.175713][T20223] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 518.183689][T20223] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x101400, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_buf(r3, 0x29, 0xcc, &(0x7f0000000100)="089bb26b831493140327a8a663d8fddcfe66ea5d5c605e8cf9b84cb74f54ce897b9b8b75534cb36ff61a1068a50bc3548b62d99cb55efd92b7ad41fac777a5ccd3003adf0e9084db0efb0dff74bbe328c809168518aa7ce3a4b7a6ad054794b95cf37de67b001c7ca9e3664c6b833098a20b2a7ac60e60cc622bd45bea584a", 0x7f) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:06 executing program 5 (fault-call:5 fault-nth:12): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:06 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:06 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x2201) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 518.387710][T20346] usb usb7: usbfs: process 20346 (syz-executor.0) did not claim interface 0 before use [ 518.509074][T20352] FAULT_INJECTION: forcing a failure. [ 518.509074][T20352] name failslab, interval 1, probability 0, space 0, times 0 [ 518.557168][T20352] CPU: 1 PID: 20352 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 518.565886][T20352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.575942][T20352] Call Trace: [ 518.579280][T20352] dump_stack+0x11d/0x181 [ 518.583621][T20352] should_fail.cold+0xa/0x1a [ 518.588216][T20352] __should_failslab+0xee/0x130 [ 518.593106][T20352] should_failslab+0x9/0x14 [ 518.597659][T20352] kmem_cache_alloc_trace+0x2a/0x5d0 [ 518.602953][T20352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.609198][T20352] ? should_fail+0xd4/0x45d [ 518.613695][T20352] p9_client_create+0x70/0xc60 [ 518.618443][T20352] ? debug_smp_processor_id+0x43/0x137 [ 518.623916][T20352] ? __kmalloc_track_caller+0x230/0x690 [ 518.629513][T20352] ? v9fs_session_init+0x85/0xf10 [ 518.634594][T20352] v9fs_session_init+0x115/0xf10 [ 518.639516][T20352] ? v9fs_session_init+0x115/0xf10 [ 518.644611][T20352] ? should_fail+0xd4/0x45d [ 518.649096][T20352] ? __write_once_size.constprop.0+0x12/0x20 [ 518.655155][T20352] ? memcg_kmem_put_cache+0x7c/0xc0 [ 518.660336][T20352] ? debug_smp_processor_id+0x43/0x137 [ 518.665779][T20352] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 518.671361][T20352] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 518.676892][T20352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.683122][T20352] v9fs_mount+0x73/0x620 [ 518.687352][T20352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 518.693595][T20352] ? security_capable+0x92/0xb0 [ 518.698437][T20352] ? v9fs_write_inode+0x60/0x60 [ 518.703291][T20352] legacy_get_tree+0x7e/0xf0 [ 518.707868][T20352] vfs_get_tree+0x56/0x1a0 [ 518.712399][T20352] do_mount+0x1004/0x14f0 [ 518.716713][T20352] ksys_mount+0xe8/0x160 [ 518.720939][T20352] __x64_sys_mount+0x70/0x90 [ 518.725625][T20352] do_syscall_64+0xcc/0x3a0 [ 518.730203][T20352] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 518.736146][T20352] RIP: 0033:0x45a919 02:34:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x3, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20100, 0x0) dup(r2) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2d) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000000)) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:07 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8008550e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 518.740100][T20352] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.759735][T20352] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 518.768126][T20352] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 518.776121][T20352] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 518.784130][T20352] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 518.792092][T20352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 518.800047][T20352] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:09 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00\xfa\xe6\xaf\aBS\xe5\xa5\x96\xfd\x92\x1c=!\x9b\xd4\x02\xdf\xf5\x82J\x92\r\xe3tlb\xc6\xcdR\x15\xa5\x04\'{g\xde\xdeN\x85G\b\xf1.k\x87q\xe9\x00\x00\x00\x00\x00\x00\x00$\x94\xf7\x98\xa1\xd6hGH\x9cI\b\x1f}\x1d\xc2\xb8\x1c\xdfX7\xe6}\x18\xd7\x13kK\x1f\xa0\x13\x89Z\xd3_\xf9\ns\xe9\xd5\xf1)\xe8\x9e^=\x91\x02\xae\x90\xd1\'\xe4\xc4*^\f\x8a\xf9\xfc}0\xe7\xa4^c\vD\xc3<\x84\x19C>\xa5\xb0\v\xf9M{\xa6j\xb3\xd5\x81 \xc5S\xce>\x9a\xa2\x14\xbc-K(\xef\x8f\x02E\xe1\x1f\xd2\xb8\x15\xa6\xb5e\xff\xbc\v\xb4\xf7\x19\x11\xd4\xbb\x14\x02yf\bN\xcc\x962c\x82(\x91qj\xef\xffM\xbb\xac?\xd9\xfb\x8b\f/\x811\xd4^9\xcd\xe0\xc2\f6\xdc\xa6\xf3\'|\xa5\xfc4\x9aE\x84\xba\x8b\'\xd4\xadpD|\x85\xc2ZUD\'') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00\xfa\xe6\xaf\aBS\xe5\xa5\x96\xfd\x92\x1c=!\x9b\xd4\x02\xdf\xf5\x82J\x92\r\xe3tlb\xc6\xcdR\x15\xa5\x04\'{g\xde\xdeN\x85G\b\xf1.k\x87q\xe9\x00\x00\x00\x00\x00\x00\x00$\x94\xf7\x98\xa1\xd6hGH\x9cI\b\x1f}\x1d\xc2\xb8\x1c\xdfX7\xe6}\x18\xd7\x13kK\x1f\xa0\x13\x89Z\xd3_\xf9\ns\xe9\xd5\xf1)\xe8\x9e^=\x91\x02\xae\x90\xd1\'\xe4\xc4*^\f\x8a\xf9\xfc}0\xe7\xa4^c\vD\xc3<\x84\x19C>\xa5\xb0\v\xf9M{\xa6j\xb3\xd5\x81 \xc5S\xce>\x9a\xa2\x14\xbc-K(\xef\x8f\x02E\xe1\x1f\xd2\xb8\x15\xa6\xb5e\xff\xbc\v\xb4\xf7\x19\x11\xd4\xbb\x14\x02yf\bN\xcc\x962c\x82(\x91qj\xef\xffM\xbb\xac?\xd9\xfb\x8b\f/\x811\xd4^9\xcd\xe0\xc2\f6\xdc\xa6\xf3\'|\xa5\xfc4\x9aE\x84\xba\x8b\'\xd4\xadpD|\x85\xc2ZUD\'') 02:34:09 executing program 5 (fault-call:5 fault-nth:13): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:09 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8008551c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) prctl$PR_MCE_KILL_GET(0x22) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r2) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sendto$unix(r4, &(0x7f0000000180)="f6b514a8ee476db2718696a5b18769da4222cc751f3c527b14dca17f7c99c60a761cb02ae3c1f669072e1c194b97d676e4321cc7ae3bed3bd18298956944d9b8f9e5bc2b77d5187d773d45e040bc3303e3ead7a7027468080320773bd57cd46e2ecc8abbc5f682a93bad3550be72827356a67a948d24", 0x76, 0x0, &(0x7f00000002c0)=@file={0x6dba0857db91c173, './file0\x00'}, 0x6e) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x56174d5036735fdd, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000340)) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r3, r6}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x03@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x95\x00'}, &(0x7f0000000180)}) keyctl$invalidate(0x15, r6) ptrace$setopts(0x4206, r1, 0x0, 0x20) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:09 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8008551d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 521.022871][T20482] FAULT_INJECTION: forcing a failure. [ 521.022871][T20482] name failslab, interval 1, probability 0, space 0, times 0 [ 521.049870][T20482] CPU: 0 PID: 20482 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 521.058575][T20482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.068640][T20482] Call Trace: [ 521.071955][T20482] dump_stack+0x11d/0x181 [ 521.076405][T20482] should_fail.cold+0xa/0x1a [ 521.081135][T20482] __should_failslab+0xee/0x130 [ 521.086000][T20482] should_failslab+0x9/0x14 [ 521.090587][T20482] __kmalloc_track_caller+0x4f/0x690 [ 521.095881][T20482] ? debug_smp_processor_id+0x43/0x137 [ 521.101364][T20482] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 521.106920][T20482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.113206][T20482] ? p9_client_create+0x246/0xc60 [ 521.118233][T20482] kstrdup+0x43/0x80 [ 521.122145][T20482] p9_client_create+0x246/0xc60 [ 521.127012][T20482] ? debug_smp_processor_id+0x43/0x137 [ 521.132515][T20482] ? __kmalloc_track_caller+0x230/0x690 [ 521.138074][T20482] ? v9fs_session_init+0x85/0xf10 [ 521.143113][T20482] v9fs_session_init+0x115/0xf10 [ 521.148770][T20482] ? v9fs_session_init+0x115/0xf10 [ 521.153958][T20482] ? should_fail+0xd4/0x45d [ 521.158500][T20482] ? __write_once_size.constprop.0+0x12/0x20 [ 521.164558][T20482] ? memcg_kmem_put_cache+0x7c/0xc0 [ 521.169770][T20482] ? debug_smp_processor_id+0x43/0x137 [ 521.175238][T20482] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 521.180795][T20482] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 521.186362][T20482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.192621][T20482] v9fs_mount+0x73/0x620 [ 521.196893][T20482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 521.203145][T20482] ? security_capable+0x92/0xb0 [ 521.208429][T20482] ? v9fs_write_inode+0x60/0x60 [ 521.213282][T20482] legacy_get_tree+0x7e/0xf0 [ 521.217893][T20482] vfs_get_tree+0x56/0x1a0 [ 521.222377][T20482] do_mount+0x1004/0x14f0 [ 521.226721][T20482] ksys_mount+0xe8/0x160 [ 521.230973][T20482] __x64_sys_mount+0x70/0x90 [ 521.235576][T20482] do_syscall_64+0xcc/0x3a0 [ 521.240157][T20482] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 521.246046][T20482] RIP: 0033:0x45a919 [ 521.249957][T20482] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:34:09 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x2000}) 02:34:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f00000000c0)=""/136, &(0x7f0000000000)=0x88) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x400042, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x84040, 0x0) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000380)={@remote, @local, @ipv4, 0x6, 0x8, 0x0, 0x600, 0x0, 0x200000, r7}) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r8 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r8, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000002c0)={0x6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000300)={r9, 0x99b6e03d880e4903}) r10 = dup2(0xffffffffffffffff, r8) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) mq_timedsend(r10, &(0x7f0000000180)="b2ccfa46a16e70a32ecbf2066e16d0499e0e725bf809a011f14ad08770dc84c64b9165666782f3ffa8d574265d96d4cbaa689174df1665d5213227a8c9c5ac682e464e965ec5cfb7113e366f56961e736536a2f03810abd76e2cafa1dada71da10fe73367dfe7e5d2d3af15af75827bc3adb298d6d1ba08287cc", 0x7a, 0x10a1, &(0x7f0000000200)={r11, r12+30000000}) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x6558a7e3409167e0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r3 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r3, r2, &(0x7f0000000180)=0x74000000, 0x5) 02:34:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000140)=0x2, 0x4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x680c1, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f00000000c0)={0x0, 0x9, 0x0, [], &(0x7f0000000040)=0x1f}) ioctl$int_in(r2, 0x5421, &(0x7f0000000180)=0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2f) fcntl$setstatus(r1, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 521.269568][T20482] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 521.278013][T20482] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 521.285989][T20482] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 521.294062][T20482] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 521.302110][T20482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 521.310086][T20482] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:12 executing program 5 (fault-call:5 fault-nth:14): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsu\x00', 0x80, 0x0) r2 = timerfd_create(0x0, 0x0) fstat(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x2, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, '@/}wlan1proc&@@cpuset'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r5}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@obj_type={'obj_type', 0x3d, '(%ppp0/bdevuser'}}, {@permit_directio='permit_directio'}]}}) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() r7 = socket(0x10, 0x80002, 0xc) r8 = accept$inet6(r7, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) setsockopt$inet6_buf(r8, 0x29, 0x22, &(0x7f00000000c0)="97a6bdc93b0ae11401fb8cc5727fda332acf4f54cb35d73baec3463dfd4d227f38ff8a41b7d3f4cf8cf3fa271bbdf850f0139409b88a3c204d7b4363000000000825f1424a5dcbf0a864746da0971d2433cc4fae5dc1df2f54123cb12a7bd8861b05ff7246c5f39193ae970092ac73130a6ec2359c078d9975b1035384a0cca5dc079202bf83c4476684ee93d3a4", 0x493) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:12 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x80086301, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:12 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x2201) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)=0xffffff1b) 02:34:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:12 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8010550e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e22, 0x3, 0x4e23, 0x1f, 0x2, 0x0, 0x80, 0xe22b6399317e10d, 0x0, r1}, {0x5, 0x3, 0x6, 0x2, 0x1, 0xffff, 0x1, 0xffffffff}, {0x2, 0x1, 0x8, 0x2}, 0xde, 0x6e6bba, 0x0, 0x1, 0x4}, {{@in=@dev={0xac, 0x14, 0x14, 0x19}, 0x4d6, 0xff}, 0x2, @in=@empty, 0x3506, 0x2, 0x1, 0x20, 0x7ff, 0xeff3, 0x100}}, 0xe8) r2 = socket$inet6(0xa, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x88040, 0x0) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) ppoll(&(0x7f0000000340)=[{r2, 0x1}, {r4, 0x8011}, {r5, 0x4002}], 0x3, &(0x7f00000005c0)={r6, r7+30000000}, &(0x7f0000000600)={0x4}, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6, 0xfffffffd}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) [ 524.241601][T20727] FAULT_INJECTION: forcing a failure. [ 524.241601][T20727] name failslab, interval 1, probability 0, space 0, times 0 [ 524.257764][T20727] CPU: 0 PID: 20727 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 524.266509][T20727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.276565][T20727] Call Trace: [ 524.279877][T20727] dump_stack+0x11d/0x181 [ 524.284343][T20727] should_fail.cold+0xa/0x1a [ 524.289058][T20727] __should_failslab+0xee/0x130 [ 524.293940][T20727] should_failslab+0x9/0x14 [ 524.298468][T20727] __kmalloc_track_caller+0x4f/0x690 [ 524.304689][T20727] ? __kmalloc_track_caller+0x230/0x690 [ 524.310248][T20727] ? strcmp+0x5e/0x70 [ 524.314285][T20727] ? match_strdup+0x40/0x50 [ 524.320213][T20727] kmemdup_nul+0x3a/0x80 [ 524.324559][T20727] match_strdup+0x40/0x50 [ 524.329086][T20727] p9_client_create+0x32e/0xc60 [ 524.335357][T20727] ? debug_smp_processor_id+0x43/0x137 [ 524.340866][T20727] ? v9fs_session_init+0x85/0xf10 [ 524.346039][T20727] v9fs_session_init+0x115/0xf10 [ 524.351001][T20727] ? v9fs_session_init+0x115/0xf10 [ 524.356123][T20727] ? should_fail+0xd4/0x45d [ 524.360668][T20727] ? __write_once_size.constprop.0+0x12/0x20 [ 524.366662][T20727] ? memcg_kmem_put_cache+0x7c/0xc0 [ 524.371871][T20727] ? debug_smp_processor_id+0x43/0x137 [ 524.377345][T20727] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 524.382995][T20727] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 524.388642][T20727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.395011][T20727] v9fs_mount+0x73/0x620 [ 524.399285][T20727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.405533][T20727] ? security_capable+0x92/0xb0 [ 524.410471][T20727] ? v9fs_write_inode+0x60/0x60 [ 524.415371][T20727] legacy_get_tree+0x7e/0xf0 [ 524.419993][T20727] vfs_get_tree+0x56/0x1a0 [ 524.424437][T20727] do_mount+0x1004/0x14f0 [ 524.428873][T20727] ksys_mount+0xe8/0x160 [ 524.433138][T20727] __x64_sys_mount+0x70/0x90 [ 524.437810][T20727] do_syscall_64+0xcc/0x3a0 [ 524.442402][T20727] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 524.448295][T20727] RIP: 0033:0x45a919 [ 524.452239][T20727] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.471867][T20727] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 524.480346][T20727] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 02:34:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() timerfd_create(0x7, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:13 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x2201) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000300)={0x2, 0x0, 0x0, 0x7, 0xffffffffffffffc0, 0x0, 0x0}) [ 524.488359][T20727] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 524.496351][T20727] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 524.504373][T20727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 524.512348][T20727] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:13 executing program 5 (fault-call:5 fault-nth:15): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 524.788707][T20944] FAULT_INJECTION: forcing a failure. [ 524.788707][T20944] name failslab, interval 1, probability 0, space 0, times 0 [ 524.801752][T20944] CPU: 0 PID: 20944 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 524.810428][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.820486][T20944] Call Trace: [ 524.823775][T20944] dump_stack+0x11d/0x181 [ 524.828108][T20944] should_fail.cold+0xa/0x1a [ 524.832700][T20944] __should_failslab+0xee/0x130 [ 524.837619][T20944] should_failslab+0x9/0x14 [ 524.842144][T20944] __kmalloc_track_caller+0x4f/0x690 [ 524.847762][T20944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.854003][T20944] ? should_fail+0xd4/0x45d [ 524.858579][T20944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.864828][T20944] ? parse_opts.part.0+0x44/0x220 [ 524.869864][T20944] kstrdup+0x43/0x80 [ 524.873790][T20944] parse_opts.part.0+0x44/0x220 [ 524.878680][T20944] ? debug_smp_processor_id+0x43/0x137 [ 524.884130][T20944] ? ___cache_free+0x2e/0x320 [ 524.888842][T20944] p9_fd_create+0x8d/0x230 [ 524.893281][T20944] ? p9_client_create+0x5d3/0xc60 [ 524.898310][T20944] p9_client_create+0x60c/0xc60 [ 524.903158][T20944] ? debug_smp_processor_id+0x43/0x137 [ 524.908698][T20944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.914943][T20944] ? v9fs_session_init+0x85/0xf10 [ 524.920036][T20944] v9fs_session_init+0x115/0xf10 [ 524.924973][T20944] ? v9fs_session_init+0x115/0xf10 [ 524.930191][T20944] ? should_fail+0xd4/0x45d [ 524.934725][T20944] ? __write_once_size.constprop.0+0x12/0x20 [ 524.940803][T20944] ? memcg_kmem_put_cache+0x7c/0xc0 [ 524.946005][T20944] ? debug_smp_processor_id+0x43/0x137 [ 524.951533][T20944] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 524.957141][T20944] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 524.962694][T20944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.969039][T20944] v9fs_mount+0x73/0x620 [ 524.973279][T20944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 524.979511][T20944] ? security_capable+0x92/0xb0 [ 524.984358][T20944] ? v9fs_write_inode+0x60/0x60 [ 524.989360][T20944] legacy_get_tree+0x7e/0xf0 [ 524.994061][T20944] vfs_get_tree+0x56/0x1a0 [ 524.998474][T20944] do_mount+0x1004/0x14f0 [ 525.002826][T20944] ksys_mount+0xe8/0x160 [ 525.007128][T20944] __x64_sys_mount+0x70/0x90 [ 525.011762][T20944] do_syscall_64+0xcc/0x3a0 [ 525.016277][T20944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 525.022159][T20944] RIP: 0033:0x45a919 [ 525.026213][T20944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.045805][T20944] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 525.054215][T20944] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 525.062205][T20944] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 525.070238][T20944] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 525.078201][T20944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 525.086191][T20944] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 [ 525.114647][T20944] 9pnet: Insufficient options for proto=fd 02:34:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xc502, &(0x7f0000000100)={&(0x7f00000004c0)={0x28, 0x22, 0x829, 0x0, 0x0, {0x5, 0x1000000}, [@typed={0x14, 0x11, @ipv6=@local}]}, 0x28}, 0x1, 0xfdffffff00000000}, 0x0) 02:34:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0xd) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:15 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x802c550a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:15 executing program 5 (fault-call:5 fault-nth:16): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 527.300845][T20964] FAULT_INJECTION: forcing a failure. [ 527.300845][T20964] name failslab, interval 1, probability 0, space 0, times 0 02:34:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x28b) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000013) tkill(r1, 0x2c) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x3001a) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000180)={0x8000, 0x101}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x200, 0xa, 0x1f, 0x28, "66cdef36a62d849ca8062528ae2b2fcbd53da57f39e605d87f4ab3fa729a8459efc9483a45d6b6912085533142e20c2a5465e701d8e6568460bb1d178cba3df4", "d772ea1f0e6305a045e43b0226b91b3d408a2f75645f4f70006e47a483f7fb07", [0x7fffffff, 0x3]}) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000040)=""/58) 02:34:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad61421349f2f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788", 0xfb}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 527.342892][T20964] CPU: 0 PID: 20964 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 527.351604][T20964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.361758][T20964] Call Trace: [ 527.365153][T20964] dump_stack+0x11d/0x181 [ 527.369506][T20964] should_fail.cold+0xa/0x1a [ 527.374103][T20964] __should_failslab+0xee/0x130 [ 527.378955][T20964] should_failslab+0x9/0x14 [ 527.383475][T20964] __kmalloc_track_caller+0x4f/0x690 [ 527.388771][T20964] ? simple_strtoull+0x95/0xc0 [ 527.393552][T20964] ? match_number.isra.0+0x4d/0x110 [ 527.398787][T20964] kmemdup_nul+0x3a/0x80 [ 527.403033][T20964] match_number.isra.0+0x4d/0x110 [ 527.408067][T20964] match_int+0x42/0x60 [ 527.412177][T20964] parse_opts.part.0+0x166/0x220 [ 527.417116][T20964] ? ___cache_free+0x2e/0x320 [ 527.421802][T20964] p9_fd_create+0x8d/0x230 [ 527.426339][T20964] ? p9_client_create+0x5d3/0xc60 [ 527.431393][T20964] p9_client_create+0x60c/0xc60 [ 527.436237][T20964] ? debug_smp_processor_id+0x43/0x137 [ 527.441758][T20964] ? v9fs_session_init+0x85/0xf10 [ 527.446800][T20964] v9fs_session_init+0x115/0xf10 [ 527.451803][T20964] ? v9fs_session_init+0x115/0xf10 [ 527.456952][T20964] ? should_fail+0xd4/0x45d [ 527.461457][T20964] ? __write_once_size.constprop.0+0x12/0x20 [ 527.467488][T20964] ? memcg_kmem_put_cache+0x7c/0xc0 [ 527.472699][T20964] ? debug_smp_processor_id+0x43/0x137 [ 527.478157][T20964] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 527.483701][T20964] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 527.489243][T20964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.495532][T20964] v9fs_mount+0x73/0x620 [ 527.499770][T20964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.506001][T20964] ? security_capable+0x92/0xb0 [ 527.510857][T20964] ? v9fs_write_inode+0x60/0x60 [ 527.515703][T20964] legacy_get_tree+0x7e/0xf0 [ 527.520369][T20964] vfs_get_tree+0x56/0x1a0 [ 527.524826][T20964] do_mount+0x1004/0x14f0 [ 527.529162][T20964] ksys_mount+0xe8/0x160 [ 527.533414][T20964] __x64_sys_mount+0x70/0x90 [ 527.538031][T20964] do_syscall_64+0xcc/0x3a0 [ 527.542601][T20964] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 527.548486][T20964] RIP: 0033:0x45a919 [ 527.552385][T20964] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.571981][T20964] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 527.580393][T20964] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 02:34:16 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000580)={0x0, 0x5}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000180)={0x0, 0x99f2}, 0x8) 02:34:16 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8038550a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 527.588404][T20964] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 527.596370][T20964] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 527.604355][T20964] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 527.612358][T20964] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 [ 527.626594][T20964] 9pnet: Insufficient options for proto=fd 02:34:16 executing program 5 (fault-call:5 fault-nth:17): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:16 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) fcntl$getflags(r0, 0x1) 02:34:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 527.823194][T20986] FAULT_INJECTION: forcing a failure. [ 527.823194][T20986] name failslab, interval 1, probability 0, space 0, times 0 [ 527.861096][T20986] CPU: 0 PID: 20986 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 527.869813][T20986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.879954][T20986] Call Trace: [ 527.883307][T20986] dump_stack+0x11d/0x181 [ 527.887721][T20986] should_fail.cold+0xa/0x1a [ 527.892394][T20986] __should_failslab+0xee/0x130 [ 527.897262][T20986] should_failslab+0x9/0x14 [ 527.901863][T20986] __kmalloc_track_caller+0x4f/0x690 [ 527.907171][T20986] ? simple_strtoull+0x95/0xc0 [ 527.911943][T20986] ? match_number.isra.0+0x4d/0x110 [ 527.917146][T20986] kmemdup_nul+0x3a/0x80 [ 527.921393][T20986] match_number.isra.0+0x4d/0x110 [ 527.926431][T20986] match_int+0x42/0x60 [ 527.930508][T20986] parse_opts.part.0+0x166/0x220 [ 527.935516][T20986] ? ___cache_free+0x2e/0x320 [ 527.940197][T20986] p9_fd_create+0x8d/0x230 [ 527.944617][T20986] p9_client_create+0x60c/0xc60 [ 527.949463][T20986] ? debug_smp_processor_id+0x43/0x137 [ 527.954955][T20986] ? v9fs_session_init+0x85/0xf10 [ 527.960809][T20986] v9fs_session_init+0x115/0xf10 [ 527.965747][T20986] ? v9fs_session_init+0x115/0xf10 [ 527.970855][T20986] ? should_fail+0xd4/0x45d [ 527.975359][T20986] ? __write_once_size.constprop.0+0x12/0x20 [ 527.981338][T20986] ? memcg_kmem_put_cache+0x7c/0xc0 [ 527.986531][T20986] ? debug_smp_processor_id+0x43/0x137 [ 527.991990][T20986] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 527.997535][T20986] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 528.003088][T20986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.009325][T20986] v9fs_mount+0x73/0x620 [ 528.013562][T20986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.019794][T20986] ? security_capable+0x92/0xb0 [ 528.024643][T20986] ? v9fs_write_inode+0x60/0x60 [ 528.029485][T20986] legacy_get_tree+0x7e/0xf0 [ 528.034143][T20986] vfs_get_tree+0x56/0x1a0 [ 528.038558][T20986] do_mount+0x1004/0x14f0 [ 528.043088][T20986] ksys_mount+0xe8/0x160 [ 528.047344][T20986] __x64_sys_mount+0x70/0x90 [ 528.051955][T20986] do_syscall_64+0xcc/0x3a0 [ 528.056471][T20986] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 528.062385][T20986] RIP: 0033:0x45a919 [ 528.066361][T20986] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.086026][T20986] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 528.094829][T20986] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 528.103171][T20986] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 528.111136][T20986] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 02:34:16 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:16 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x2201) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000000)) [ 528.119110][T20986] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 528.127072][T20986] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 [ 528.153612][T20986] 9pnet: Insufficient options for proto=fd 02:34:16 executing program 3: 02:34:16 executing program 5 (fault-call:5 fault-nth:18): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 528.463893][T21013] FAULT_INJECTION: forcing a failure. [ 528.463893][T21013] name failslab, interval 1, probability 0, space 0, times 0 [ 528.477987][T21013] CPU: 0 PID: 21013 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 528.486716][T21013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.496765][T21013] Call Trace: [ 528.500039][T21013] dump_stack+0x11d/0x181 [ 528.504408][T21013] should_fail.cold+0xa/0x1a [ 528.509123][T21013] __should_failslab+0xee/0x130 [ 528.513962][T21013] should_failslab+0x9/0x14 [ 528.518546][T21013] kmem_cache_alloc_trace+0x2a/0x5d0 [ 528.523856][T21013] ? ___cache_free+0x2e/0x320 [ 528.528516][T21013] p9_fd_create+0x11f/0x230 [ 528.533008][T21013] p9_client_create+0x60c/0xc60 [ 528.537914][T21013] ? debug_smp_processor_id+0x43/0x137 [ 528.543371][T21013] ? v9fs_session_init+0x85/0xf10 [ 528.548380][T21013] v9fs_session_init+0x115/0xf10 [ 528.553345][T21013] ? v9fs_session_init+0x115/0xf10 [ 528.558440][T21013] ? should_fail+0xd4/0x45d [ 528.563007][T21013] ? __write_once_size.constprop.0+0x12/0x20 [ 528.568996][T21013] ? memcg_kmem_put_cache+0x7c/0xc0 [ 528.574179][T21013] ? debug_smp_processor_id+0x43/0x137 [ 528.579629][T21013] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 528.585214][T21013] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 528.590799][T21013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.597190][T21013] v9fs_mount+0x73/0x620 [ 528.601448][T21013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.607743][T21013] ? security_capable+0x92/0xb0 [ 528.612642][T21013] ? v9fs_write_inode+0x60/0x60 [ 528.617525][T21013] legacy_get_tree+0x7e/0xf0 [ 528.622142][T21013] vfs_get_tree+0x56/0x1a0 [ 528.626556][T21013] do_mount+0x1004/0x14f0 [ 528.630944][T21013] ksys_mount+0xe8/0x160 [ 528.635226][T21013] __x64_sys_mount+0x70/0x90 [ 528.639894][T21013] do_syscall_64+0xcc/0x3a0 [ 528.644402][T21013] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 528.650356][T21013] RIP: 0033:0x45a919 [ 528.654239][T21013] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.673868][T21013] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 528.682269][T21013] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 528.690258][T21013] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 528.698291][T21013] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 528.706309][T21013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 528.714271][T21013] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) setfsuid(r2) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:19 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc004500a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:19 executing program 3: 02:34:19 executing program 5 (fault-call:5 fault-nth:19): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:19 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:19 executing program 3: 02:34:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 530.602368][T21027] FAULT_INJECTION: forcing a failure. [ 530.602368][T21027] name failslab, interval 1, probability 0, space 0, times 0 [ 530.668853][T21027] CPU: 1 PID: 21027 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 530.677655][T21027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.687811][T21027] Call Trace: [ 530.691114][T21027] dump_stack+0x11d/0x181 [ 530.695464][T21027] should_fail.cold+0xa/0x1a [ 530.700065][T21027] __should_failslab+0xee/0x130 [ 530.704985][T21027] should_failslab+0x9/0x14 [ 530.709498][T21027] kmem_cache_alloc+0x29/0x5d0 [ 530.714274][T21027] ? ___cache_free+0x2e/0x320 [ 530.719037][T21027] ? simple_strtoull+0x95/0xc0 [ 530.723853][T21027] p9_client_prepare_req.part.0+0x66/0x4c0 [ 530.729692][T21027] p9_client_rpc+0x152/0xaf0 [ 530.734297][T21027] ? p9_fd_poll+0x121/0x170 [ 530.738883][T21027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.745180][T21027] ? p9_conn_create+0x252/0x280 [ 530.750038][T21027] ? p9_fd_create+0x1bd/0x230 [ 530.754729][T21027] p9_client_create+0x807/0xc60 [ 530.759586][T21027] ? debug_smp_processor_id+0x43/0x137 [ 530.765122][T21027] ? v9fs_session_init+0x85/0xf10 [ 530.770231][T21027] v9fs_session_init+0x115/0xf10 [ 530.775193][T21027] ? v9fs_session_init+0x115/0xf10 [ 530.780327][T21027] ? should_fail+0xd4/0x45d [ 530.784845][T21027] ? __write_once_size.constprop.0+0x12/0x20 [ 530.790847][T21027] ? memcg_kmem_put_cache+0x7c/0xc0 [ 530.796160][T21027] ? debug_smp_processor_id+0x43/0x137 [ 530.801706][T21027] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 530.807256][T21027] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 530.812892][T21027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.819248][T21027] v9fs_mount+0x73/0x620 [ 530.823503][T21027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.829746][T21027] ? security_capable+0x92/0xb0 [ 530.834598][T21027] ? v9fs_write_inode+0x60/0x60 [ 530.839584][T21027] legacy_get_tree+0x7e/0xf0 [ 530.844212][T21027] vfs_get_tree+0x56/0x1a0 [ 530.848679][T21027] do_mount+0x1004/0x14f0 [ 530.853014][T21027] ksys_mount+0xe8/0x160 [ 530.857265][T21027] __x64_sys_mount+0x70/0x90 [ 530.861851][T21027] do_syscall_64+0xcc/0x3a0 [ 530.866385][T21027] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 530.872276][T21027] RIP: 0033:0x45a919 [ 530.876198][T21027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.895832][T21027] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 530.904238][T21027] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 530.912216][T21027] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 02:34:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x40001, 0xffffffffffffff20) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0x7, 0x3, 0x3}) ioctl$SOUND_MIXER_READ_DEVMASK(r2, 0x80044dfe, &(0x7f0000000280)) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000380), 0xfffffffffffffffd) r4 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r4, &(0x7f0000000140), 0xffffffffffffff68, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_buf(r5, 0x29, 0x1f, &(0x7f00000000c0)="ada77bfc971bdfa60cd2af948493272eb659466f6377f755475641b6b75b2f00a7d5f6b00308e76fd03377df4c950b790bc97fce6fbad813f24fb8c48126721005901275cb423a8be4a406b4652112b137911d58ae7933939c8f17f85593ba3e24a0108b6c7375c7880853cc34155eb7c269108e40f83d373d7573f0e6ca795ef7f04fd4f21d353e9761d42ac478a18e6088186de9b9fc00"/163, 0xa3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000200)={0x3f, "59f64e5ccec43754e67056b68bdd0620f7d69760fee2ad5fd04747eb82bc4fdb", 0x3, 0x7, 0x5, 0xe1431e59ef43755b, 0x830, 0x4}) sched_setparam(0xffffffffffffffff, &(0x7f0000000040)=0x76) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r6 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 530.920195][T21027] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 530.928167][T21027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 530.936235][T21027] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:19 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:19 executing program 5 (fault-call:5 fault-nth:20): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = gettid() connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x8034a35cca798f26, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() syz_open_procfs(r1, &(0x7f0000000680)='attr\x00') setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x6305, r2, 0x0, 0x595e82fbdb09ef2f) tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) sendmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000000)=@ipx={0x4, 0xfffa, 0x9, "cb7533f45b3c", 0x1}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="81571ecb441fe0911c77ca85bdc4eaaf47035259d876a8002e71da1945937a540379ace93381a783764e202befa2934b11029932a5b40752e7fbff09de62da5d7d87e6fc52d259cde1803d943ea019171f49a4e0f01157c39f5c8a4a809316b55a03e2e6c1d0d760eef24938f69c7f5f0da2ceae1c04a4ec4cad95a1ff0bbb995e63fe877c5768372b68705765056a5f81734bb467d16c2cbc4f6535c15e9481023408c53cafba17ef5e8abe0b27c54bf62988f0529a9a4ccd6e4f5f44e779a14d84323dd2e9f2500793ebc8cdab1e8dbe69cddf21111d1e0e509aa597b54442d997925437b00d19e7955c0ad165dfed87fa", 0xf2}, {&(0x7f00000001c0)="9d4976c3a89825607efd26808ba1713280a6acc00ce446c53b71b6e4687ba5681db713afacf190892f105bb8312a1f320cd373f36d5d4bf7b7d35f10dc4e97600f14177ef06c18d85542", 0x4a}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f00000003c0)="511f0d93eeafdaf0f37870d3941b804130073a0b3dcd96b99892b543245e3c499242eb0c909c887b536b6edc6096909a69eff5100148826e36946b2323bff18c8963ff8158320befcddf0665377186d9ed7a508be67c38969fd0a1b1fafb692367ce7e32c634debc2d6c588150d0f6ee0dbc8b822276e87a054d102dae8d7c62595533f3d02ce9c66d1d8e88e7c1150049eb32fd3b2af672d513d456346febee146dfe7d2d12122f3e081c38dea583164d74cbda72d389d682ec51aa006bf99a9730a479dce160398998bfaf1528b7b3", 0xd0}], 0x4, &(0x7f00000004c0)=[{0xc8, 0x0, 0x1, "87c32a278eda123c8b628086543e8cb02fae02a743b1c686588f385d17313bd9cbebbe273cbd22c68c0fb35502ecbaba294a0a829cbc560ab157731554f66df915a721b36288e0b8feda7aff5dce27f909c7b8eefa60a3204048790cdd9b7e3818c8bab99bfcc884f4b5e0b92d4b3e83339c3f24ea731498d7237808a5354919036e9ab8bc79fa40f980f75641027e9625c267ee93cdfd4377028c661f1da70e98e00c6d76bda593b6933652ae1ccda58e2cace1332aefb0"}, {0x90, 0x112, 0x7, "ea9dcd7fc73ad2c0e8b2acaf523870da689aed6650dbadab40e8a641cde527d34f9078d4a265638e56549ae6842481de8efdb3a0e2715916872c9320732247c287e1df4208fcb773fc1ce487b635a813b4d13d83c2bcfb72069754d2639c7bc8bcfc148ac901f7a6b92b74979a006a9edfb3e601b02376589c4b40cb"}], 0x158}}], 0x1, 0x2400408a) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 531.031481][T21047] Unknown ioctl -1072409080 [ 531.040015][T21047] Unknown ioctl -2147201538 02:34:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:19 executing program 3: 02:34:19 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc00c5512, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 531.340644][T21067] FAULT_INJECTION: forcing a failure. [ 531.340644][T21067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 531.353883][T21067] CPU: 1 PID: 21067 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 531.362548][T21067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.372600][T21067] Call Trace: [ 531.375904][T21067] dump_stack+0x11d/0x181 [ 531.380274][T21067] should_fail.cold+0xa/0x1a [ 531.384875][T21067] should_fail_alloc_page+0x50/0x60 [ 531.390087][T21067] __alloc_pages_nodemask+0xd2/0x310 [ 531.395393][T21067] cache_grow_begin+0x76/0x5c0 [ 531.400173][T21067] kmem_cache_alloc+0x500/0x5d0 [ 531.405052][T21067] ? ___cache_free+0x2e/0x320 [ 531.409821][T21067] p9_client_prepare_req.part.0+0x66/0x4c0 [ 531.415648][T21067] p9_client_rpc+0x152/0xaf0 [ 531.420399][T21067] ? p9_fd_poll+0x121/0x170 [ 531.424938][T21067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.431251][T21067] ? p9_conn_create+0x252/0x280 [ 531.436126][T21067] ? p9_fd_create+0x1bd/0x230 [ 531.440817][T21067] p9_client_create+0x807/0xc60 [ 531.445663][T21067] ? debug_smp_processor_id+0x43/0x137 [ 531.451158][T21067] ? v9fs_session_init+0x85/0xf10 [ 531.456204][T21067] v9fs_session_init+0x115/0xf10 [ 531.461145][T21067] ? v9fs_session_init+0x115/0xf10 [ 531.466272][T21067] ? should_fail+0xd4/0x45d [ 531.470785][T21067] ? __write_once_size.constprop.0+0x12/0x20 [ 531.476821][T21067] ? memcg_kmem_put_cache+0x7c/0xc0 [ 531.482062][T21067] ? debug_smp_processor_id+0x43/0x137 02:34:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x8, 0x20000) r3 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r3, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000500)={0x1d, r4}, 0x10) r5 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0xd18, 0x0) ioctl$TIOCGPTPEER(r5, 0x5441, 0x1ff) fcntl$setstatus(r0, 0x4, 0x80000000002c00) r6 = gettid() tkill(r6, 0x1000000000013) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x6, 0x7f, 0x9, 0x85, 0x0, 0x401, 0x800, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x15415a09ed75aae4, @perf_bp={&(0x7f0000000040), 0xe}, 0x22d1, 0x9, 0x3ff, 0x3, 0xffff, 0x10000aca, 0x8}, r6, 0x10, 0xffffffffffffffff, 0x8) r7 = socket$inet6(0xa, 0x80003, 0x6b) ptrace$getregs(0xe, r6, 0x0, &(0x7f0000000540)=""/4096) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") recvfrom$inet6(r7, &(0x7f00000000c0)=""/198, 0xc6, 0x12180, &(0x7f0000000000)={0xa, 0x4e22, 0x21f, @empty, 0x1}, 0x1c) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 531.487599][T21067] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 531.493162][T21067] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 531.498820][T21067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.505077][T21067] v9fs_mount+0x73/0x620 [ 531.509387][T21067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.515636][T21067] ? security_capable+0x92/0xb0 [ 531.520528][T21067] ? v9fs_write_inode+0x60/0x60 [ 531.525395][T21067] legacy_get_tree+0x7e/0xf0 [ 531.529989][T21067] vfs_get_tree+0x56/0x1a0 [ 531.534476][T21067] do_mount+0x1004/0x14f0 02:34:20 executing program 3: [ 531.538830][T21067] ksys_mount+0xe8/0x160 [ 531.543172][T21067] __x64_sys_mount+0x70/0x90 [ 531.548733][T21067] do_syscall_64+0xcc/0x3a0 [ 531.553250][T21067] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 531.559137][T21067] RIP: 0033:0x45a919 [ 531.563129][T21067] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:34:20 executing program 3: [ 531.583885][T21067] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 531.592309][T21067] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 531.600287][T21067] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 531.608262][T21067] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 531.616265][T21067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 531.624330][T21067] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x20000000}, @sack_perm], 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCRSGL2CALL(0xffffffffffffffff, 0x89e5, &(0x7f0000000000)) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x420c, r2, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000000c0), 0x2) tkill(r2, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 02:34:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0xfb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 02:34:22 executing program 5 (fault-call:5 fault-nth:21): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 02:34:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) 02:34:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:34:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) r2 = add_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="caf740b25df9d68671f017194015f0d187a681c1ebac30e449927ee5b6d5a8fe29227cffec1de536414b04bb4eb10276e9f099aa582d8a80f1ec9d6e77b421fd031201c6414d7c2e5d52104284cf8126b8ca2b76e1b5724a4d899f4da2c24397d38151ab6bd78eff6965d9e3bb6fc7248156eb480eeadc218421766a9303c2f7337688abf267acc23093adb6bb401fe88e81765fcf8e0d67dda3ee9a41004ad4ee64ff13b4c684be7728415e146ffffb9ad5dbdeb696b25d593d48df993d375e5f94b810517632410adf3917cbb5a8b4d217a35b8ec3367902ad42a12cb47aced22559a5218ed5aa75e531dee5a68da782b4c94522ef", 0xf6, 0xfffffffffffffffa) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)='}\x00', r2) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) [ 534.259062][T21295] FAULT_INJECTION: forcing a failure. [ 534.259062][T21295] name failslab, interval 1, probability 0, space 0, times 0 [ 534.274632][T21295] CPU: 1 PID: 21295 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 534.283321][T21295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.293375][T21295] Call Trace: [ 534.296750][T21295] dump_stack+0x11d/0x181 [ 534.301219][T21295] should_fail.cold+0xa/0x1a [ 534.305829][T21295] __should_failslab+0xee/0x130 [ 534.310710][T21295] should_failslab+0x9/0x14 [ 534.315234][T21295] __kmalloc+0x53/0x690 [ 534.319396][T21295] ? memcg_kmem_put_cache+0x7c/0xc0 [ 534.325291][T21295] ? debug_smp_processor_id+0x43/0x137 [ 534.330764][T21295] ? p9_fcall_init.isra.0+0x5f/0x100 [ 534.336066][T21295] p9_fcall_init.isra.0+0x5f/0x100 [ 534.341453][T21295] p9_client_prepare_req.part.0+0x146/0x4c0 [ 534.347660][T21295] p9_client_rpc+0x152/0xaf0 [ 534.352256][T21295] ? p9_fd_poll+0x121/0x170 [ 534.356834][T21295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.363120][T21295] ? p9_conn_create+0x252/0x280 [ 534.368080][T21295] ? p9_fd_create+0x1bd/0x230 [ 534.372896][T21295] p9_client_create+0x807/0xc60 [ 534.377755][T21295] ? debug_smp_processor_id+0x43/0x137 [ 534.383324][T21295] ? v9fs_session_init+0x85/0xf10 [ 534.388638][T21295] v9fs_session_init+0x115/0xf10 [ 534.393580][T21295] ? v9fs_session_init+0x115/0xf10 [ 534.398717][T21295] ? should_fail+0xd4/0x45d [ 534.403231][T21295] ? __write_once_size.constprop.0+0x12/0x20 [ 534.409227][T21295] ? memcg_kmem_put_cache+0x7c/0xc0 [ 534.414497][T21295] ? debug_smp_processor_id+0x43/0x137 [ 534.419996][T21295] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 534.426069][T21295] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 534.431716][T21295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.437955][T21295] v9fs_mount+0x73/0x620 [ 534.442225][T21295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.448472][T21295] ? security_capable+0x92/0xb0 [ 534.453373][T21295] ? v9fs_write_inode+0x60/0x60 [ 534.458336][T21295] legacy_get_tree+0x7e/0xf0 [ 534.463448][T21295] vfs_get_tree+0x56/0x1a0 [ 534.467876][T21295] do_mount+0x1004/0x14f0 [ 534.472207][T21295] ksys_mount+0xe8/0x160 [ 534.476497][T21295] __x64_sys_mount+0x70/0x90 [ 534.481201][T21295] do_syscall_64+0xcc/0x3a0 [ 534.485732][T21295] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 534.491998][T21295] RIP: 0033:0x45a919 [ 534.495905][T21295] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.515616][T21295] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 534.524027][T21295] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 534.532436][T21295] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 534.541030][T21295] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 534.549033][T21295] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 02:34:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0105502, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 534.557017][T21295] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:23 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x2a) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x1, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x30) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x8) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) socket(0x10, 0x0, 0x4) 02:34:23 executing program 5 (fault-call:5 fault-nth:22): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 02:34:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310"}) [ 534.686560][T21404] FAULT_INJECTION: forcing a failure. [ 534.686560][T21404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 534.700177][T21404] CPU: 1 PID: 21404 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 534.708851][T21404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.718910][T21404] Call Trace: [ 534.722262][T21404] dump_stack+0x11d/0x181 [ 534.726710][T21404] should_fail.cold+0xa/0x1a [ 534.731324][T21404] should_fail_alloc_page+0x50/0x60 02:34:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r1, &(0x7f0000000140), 0xffffffffffffff68, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000000c0)={@empty, 0x7e, r2}) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x81, @mcast1}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x800000, 0x0) ioctl$sock_ifreq(r4, 0x8992, &(0x7f0000000140)={'veth0\x00', @ifru_mtu=0x9}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r5 = gettid() r6 = gettid() tkill(r6, 0x1000000000013) r7 = gettid() tkill(r7, 0x1000000000013) tkill(r7, 0x1e) r8 = getpgid(r5) tkill(r8, 0x31) fcntl$setstatus(r0, 0x4, 0x80000000002c00) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) r9 = socket$inet6(0xa, 0x80003, 0x3) ioctl(r9, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r10 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r10, 0x84, 0xf, 0x0, &(0x7f0000002000)) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r12 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r12, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r13 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r13, &(0x7f0000000140), 0x0, 0x800d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRES16=r13], &(0x7f00000000c0)=0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x1000}, &(0x7f00000001c0)=0x8) r14 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r14, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r14, 0x8935, &(0x7f0000000240)={'bcsfd\x93bo\xbe|\x00\x00\xe0\xbb/\xae', 0x8000}) [ 534.736559][T21404] __alloc_pages_nodemask+0xd2/0x310 [ 534.741867][T21404] cache_grow_begin+0x76/0x5c0 [ 534.747067][T21404] __kmalloc+0x59c/0x690 [ 534.751325][T21404] ? memcg_kmem_put_cache+0x7c/0xc0 [ 534.756573][T21404] ? debug_smp_processor_id+0x43/0x137 [ 534.762043][T21404] ? p9_fcall_init.isra.0+0x5f/0x100 [ 534.767387][T21404] p9_fcall_init.isra.0+0x5f/0x100 [ 534.772512][T21404] p9_client_prepare_req.part.0+0x146/0x4c0 [ 534.778411][T21404] p9_client_rpc+0x152/0xaf0 [ 534.783043][T21404] ? p9_fd_poll+0x121/0x170 [ 534.788175][T21404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.794515][T21404] ? p9_conn_create+0x252/0x280 [ 534.799393][T21404] ? p9_fd_create+0x1bd/0x230 [ 534.804112][T21404] p9_client_create+0x807/0xc60 [ 534.808976][T21404] ? debug_smp_processor_id+0x43/0x137 [ 534.814439][T21404] ? v9fs_session_init+0x85/0xf10 [ 534.819530][T21404] v9fs_session_init+0x115/0xf10 [ 534.824467][T21404] ? v9fs_session_init+0x115/0xf10 [ 534.829569][T21404] ? should_fail+0xd4/0x45d [ 534.834071][T21404] ? __write_once_size.constprop.0+0x12/0x20 [ 534.840157][T21404] ? memcg_kmem_put_cache+0x7c/0xc0 [ 534.845636][T21404] ? debug_smp_processor_id+0x43/0x137 [ 534.851104][T21404] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 534.856656][T21404] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 534.862190][T21404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.868587][T21404] v9fs_mount+0x73/0x620 [ 534.872887][T21404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.879192][T21404] ? security_capable+0x92/0xb0 [ 534.884091][T21404] ? v9fs_write_inode+0x60/0x60 [ 534.889022][T21404] legacy_get_tree+0x7e/0xf0 [ 534.893598][T21404] vfs_get_tree+0x56/0x1a0 [ 534.898126][T21404] do_mount+0x1004/0x14f0 [ 534.902467][T21404] ksys_mount+0xe8/0x160 [ 534.906829][T21404] __x64_sys_mount+0x70/0x90 [ 534.911490][T21404] do_syscall_64+0xcc/0x3a0 [ 534.916075][T21404] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 534.922304][T21404] RIP: 0033:0x45a919 [ 534.926325][T21404] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.947783][T21404] RSP: 002b:00007fc066aedc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 534.956364][T21404] RAX: ffffffffffffffda RBX: 00007fc066aedc90 RCX: 000000000045a919 [ 534.964391][T21404] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 534.972356][T21404] RBP: 000000000075bf20 R08: 0000000020000280 R09: 0000000000000000 [ 534.980349][T21404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc066aee6d4 [ 534.988315][T21404] R13: 00000000004c7c9b R14: 00000000004dec40 R15: 0000000000000006 02:34:23 executing program 5 (fault-call:5 fault-nth:23): creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 535.104726][ T16] ================================================================== [ 535.112870][ T16] BUG: KCSAN: data-race in smpboot_thread_fn / watchdog [ 535.119795][ T16] [ 535.122121][ T16] read to 0xffff88812b7a4050 of 8 bytes by task 1067 on cpu 0: [ 535.129660][ T16] watchdog+0x2b1/0x960 [ 535.133897][ T16] kthread+0x1d4/0x200 [ 535.137987][ T16] ret_from_fork+0x1f/0x30 [ 535.142387][ T16] [ 535.144725][ T16] write to 0xffff88812b7a4050 of 8 bytes by task 16 on cpu 1: [ 535.152190][ T16] smpboot_thread_fn+0x32f/0x4a0 [ 535.157130][ T16] kthread+0x1d4/0x200 [ 535.161192][ T16] ret_from_fork+0x1f/0x30 [ 535.166717][ T16] [ 535.169029][ T16] Reported by Kernel Concurrency Sanitizer on: [ 535.175173][ T16] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.5.0-rc1-syzkaller #0 [ 535.183307][ T16] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.193346][ T16] ================================================================== [ 535.201412][ T16] Kernel panic - not syncing: panic_on_warn set ... [ 535.208008][ T16] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.5.0-rc1-syzkaller #0 [ 535.216147][ T16] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.226188][ T16] Call Trace: [ 535.229479][ T16] dump_stack+0x11d/0x181 [ 535.233811][ T16] panic+0x210/0x640 [ 535.237702][ T16] ? vprintk_func+0x8d/0x140 [ 535.242289][ T16] kcsan_report.cold+0xc/0xd [ 535.246880][ T16] kcsan_setup_watchpoint+0x3fe/0x460 [ 535.252258][ T16] __tsan_unaligned_write8+0xc7/0x110 [ 535.257620][ T16] smpboot_thread_fn+0x32f/0x4a0 [ 535.262554][ T16] kthread+0x1d4/0x200 [ 535.266614][ T16] ? constant_test_bit.constprop.0+0x30/0x30 [ 535.272583][ T16] ? kthread_unpark+0xe0/0xe0 [ 535.277255][ T16] ret_from_fork+0x1f/0x30 [ 535.282982][ T16] Kernel Offset: disabled [ 535.287392][ T16] Rebooting in 86400 seconds..