81b73ddf251b1f46d1b5939174225b8eff401492b775679b9c88241803e1e406d92e65fa57781a3a87f1a668bba8e38361b6a5ab4f4601fe412e35f7f7b21b4b8199ce79323ec271a17878500ab", @generic="6857fbf96138f73fd9ce9d021ed750b838ce9d251f25fd780fd08947ba5e504aa4762a2d8f33ef749aef7b67fe98475d94e1aae2f091d580b6a6c172764aa94b2c5d882f380cc00db3c574"]}, @generic="36debb3981680cf709c9c533c9c6c11832c0521d412c40baa59232d2bc72a93579b83ea16d88d0272fd83185f12db9009591377f2c74886d5989a1e850ffda9b4c35a691ad5bbc7e3f357834dc65f1971624c9698efb58abcce9e67d36e8e19d6ac8405b91ae1c1b1a", @generic="9150ee8a3112821a3f47990a8e0fe1c41f61cfbc7170caf661d317871898bd1f374127251f0ddb4fbccb1eacb016106b8e7f8469f30fc93dfb0633b1f380fee6056101725179a9bfaa6ccbf23d06a834c64f0541927f99a84a7621a8b8e8352fe502c3e84fae5003fda531c735dd44d06f9e876ab52abee6c81af6f9c3aafa20f802bc9bf6251ced82e41a0f80cb4f349c61ce214929e02b4f547f0fd3f1e36879b5990d6b101b7ac68cf114250218b802e1dfbfbc6a306b9acd5644deb8b9f68cb8bcc6182de454e8b1892c2b690ed657c6d8", @typed={0x8, 0x25, @u32=0x7}]}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x5}, @IFLA_PROMISCUITY={0x8, 0x1e}, @IFLA_LINKINFO={0x168, 0x12, [@IFLA_INFO_SLAVE_KIND={0x10, 0x4, 'procnodev\x00'}, @IFLA_INFO_DATA={0xac, 0x2, "99a2e4e9b44cf1834d01ca5268c97f4db40c482ed7c743b563ad271e99cab1e6ed1ed4100d41e8cedee772ef35fb9b6028710d02cb0557126f3c9b694845597460c69127647d4f8ebddd30ad76f552f0a1970610f5eee0de5a6ded86b1fb1ec060595fe14c0875bd318681e3d4c2cd9b62816a76b024200455e294afa97427d46fb5f8ab5b292dbfa0d194189bbc7b16ddd68d599f7323705410c20480a5d0412a9852d435484f80"}, @IFLA_INFO_KIND={0xc, 0x1, 'syz1\x00'}, @IFLA_INFO_KIND={0xc, 0x1, 'syz1\x00'}, @IFLA_INFO_KIND={0xc, 0x1, 'syz1\x00'}, @IFLA_INFO_DATA={0x84, 0x2, "6b978ce9c5a4dfb8a0e6b2ee8c34d3a200bd402f0960e05a992a0045b878a8345d8a500324ac0e8f37d9425eace10fd049cd1081439ddad71c13bfd9386d3d4921f3ad50a38cb0d358783d91b4f26273e4f61f3be5d4d638c472f3c93bcb74a15b5e816b3c8ba337db39f0ae25e692395b90c8d9479b2d549322380b6f8e0625"}]}, @IFLA_MAP={0x24, 0xe, {0x5, 0x1, 0x7, 0x3ff, 0x100000000000, 0x2}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xfffffffffffffffc}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "c25c92106cf6d16b9761e37811f1dd882dce4b06ac"}, @IFLA_OPERSTATE={0x8, 0x10, 0x8}, @IFLA_PHYS_PORT_ID={0x4, 0x22}, @IFLA_LINKINFO={0x10, 0x12, [@IFLA_INFO_SLAVE_KIND={0xc, 0x4, 'syz1\x00'}]}]}, 0x17fc}, 0x1, 0x0, 0x0, 0x14}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000200)={{0x7, 0x0, 0x0, 0x0, 'syz1\x00', 0x7fffffff}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], {0x0, 0x1c9c380}}) 00:54:17 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0xfff, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0xba) getpeername(0xffffffffffffffff, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:17 executing program 3 (fault-call:2 fault-nth:9): r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x200000d8) 00:54:17 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000000)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) socket$l2tp(0x18, 0x1, 0x1) [ 141.633512] cgroup: cgroup2: unknown option "fd=20" 00:54:17 executing program 4: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xc5) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="1080000050009b9feb5ab482f179e0bc4f091334998b1c0de61c25511eb5375164bb7205b3d56e04443fc15e6bcc7a7a207a6c6eb128b8a8347eef499c1aa78f6a4178bfd2062792942ec9bcf205dcbe763bab62a381e117fd413186bbc5af8b6a77b6004c86a0f88b6d948f5c13135b5693653304d3c5d16804", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002050040daeb617312d743980a90cd15515d07f269cd9a22a79cd993541806205eca3440ed0c35eefcec70fbf0e65d20faa4cb897826c9c6e710b601b6f28452"], 0x14}, 0x1}, 0x0) 00:54:17 executing program 6: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x400000, 0x80102) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295fe1311f16f477671070") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)) 00:54:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000005780)=[{{&(0x7f00000001c0)=@nfc, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000240)=""/106, 0x6a}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/206, 0xce}], 0x4, 0x0, 0x0, 0x2d59}, 0x8001}, {{&(0x7f0000001480)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000001500)=""/137, 0x89}, {&(0x7f0000000400)}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x3, &(0x7f0000002600)=""/69, 0x45, 0x1}, 0x21e2}, {{&(0x7f0000002680)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002700)=""/136, 0x88}], 0x1, &(0x7f0000002800)=""/89, 0x59, 0x36bc}, 0x94a}, {{&(0x7f0000002880), 0x80, &(0x7f0000002940)=[{&(0x7f0000002900)}], 0x1, &(0x7f0000002980)=""/42, 0x2a, 0x4}, 0x9}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f00000029c0)=""/43, 0x2b}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0x2, &(0x7f0000003a40)=""/28, 0x1c, 0x4}, 0x100000001}, {{&(0x7f0000003a80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000003b00)=""/171, 0xab}, {&(0x7f0000003bc0)=""/85, 0x55}, {&(0x7f0000003c40)=""/182, 0xb6}], 0x3, &(0x7f0000003d40)=""/22, 0x16, 0x101}, 0xfffffffffffffff9}, {{&(0x7f0000003d80)=@nfc, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000003e00)=""/32, 0x20}, {&(0x7f0000003e40)=""/139, 0x8b}, {&(0x7f0000003f00)=""/100, 0x64}, {&(0x7f0000003f80)=""/28, 0x1c}], 0x4, &(0x7f0000004000)=""/188, 0xbc, 0x5cb2}, 0x3f}, {{&(0x7f00000040c0)=@nfc, 0x80, &(0x7f0000005680)=[{&(0x7f0000004140)=""/41, 0x29}, {&(0x7f0000004180)=""/174, 0xae}, {&(0x7f0000004240)=""/86, 0x56}, {&(0x7f00000042c0)=""/4096, 0x1000}, {&(0x7f00000052c0)=""/210, 0xd2}, {&(0x7f00000053c0)=""/167, 0xa7}, {&(0x7f0000005480)=""/65, 0x41}, {&(0x7f0000005500)=""/218, 0xda}, {&(0x7f0000005600)=""/113, 0x71}], 0x9, &(0x7f0000005740)=""/38, 0x26, 0x1000}, 0xe2c0}], 0x8, 0x40000001, &(0x7f0000005980)={0x77359400}) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="71e67a11cdf8311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="f2ec0638d7899e891dcd824fc9e4e54cadcff7244bc8f5f213d715ab26e0a4e2", 0x20}], 0x1, &(0x7f0000000240)}, 0x0) recvmmsg(r1, &(0x7f000000bb40)=[{{&(0x7f0000007a00)=@hci, 0x80, &(0x7f0000007bc0)=[{&(0x7f0000007ac0)=""/222, 0xde}], 0x1, &(0x7f0000007c00)=""/214, 0xd6}}], 0x1, 0x0, &(0x7f0000000040)) [ 141.773242] binder: 9089:9144 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 141.930695] FAULT_INJECTION: forcing a failure. [ 141.930695] name failslab, interval 1, probability 0, space 0, times 0 [ 141.942169] CPU: 0 PID: 9119 Comm: syz-executor3 Not tainted 4.18.0-rc3+ #137 [ 141.949443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.958794] Call Trace: [ 141.961392] dump_stack+0x1c9/0x2b4 [ 141.965034] ? dump_stack_print_info.cold.2+0x52/0x52 [ 141.966516] binder: 9089:9166 BC_REQUEST_DEATH_NOTIFICATION invalid ref 1864400581 [ 141.970231] ? kernel_text_address+0x79/0xf0 [ 141.970261] should_fail.cold.4+0xa/0x1a [ 141.986602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 141.991719] ? graph_lock+0x170/0x170 [ 141.995523] ? save_stack+0x43/0xd0 [ 141.999155] ? kasan_kmalloc+0xc4/0xe0 [ 142.003048] ? find_held_lock+0x36/0x1c0 [ 142.007113] ? __lock_is_held+0xb5/0x140 [ 142.011193] ? check_same_owner+0x340/0x340 [ 142.012182] binder: 9089:9168 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 142.015523] ? rcu_note_context_switch+0x730/0x730 [ 142.015547] __should_failslab+0x124/0x180 [ 142.032827] should_failslab+0x9/0x14 [ 142.036629] kmem_cache_alloc_node_trace+0x26f/0x770 [ 142.041742] __kmalloc_node_track_caller+0x33/0x70 [ 142.046679] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 142.051437] __alloc_skb+0x155/0x790 [ 142.055162] ? skb_scrub_packet+0x580/0x580 [ 142.059496] ? lock_downgrade+0x8f0/0x8f0 [ 142.063652] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 142.068071] tipc_buf_acquire+0x2d/0xf0 [ 142.072046] tipc_msg_build+0x110/0x12e0 [ 142.076109] ? perf_trace_rdev_return_int_tx_rx+0x2cd/0x6b0 [ 142.081822] ? tipc_node_get_linkname+0x110/0x110 [ 142.086691] ? trace_hardirqs_on+0xd/0x10 [ 142.090840] ? tipc_msg_assemble+0x6b0/0x6b0 [ 142.095256] ? remove_wait_queue+0x1a6/0x360 [ 142.099676] ? add_wait_queue+0x2b0/0x2b0 [ 142.103823] ? __local_bh_enable_ip+0x161/0x230 [ 142.108496] __tipc_sendstream+0x6a8/0xd20 [ 142.112737] ? tipc_connect+0x830/0x830 [ 142.116710] ? find_held_lock+0x36/0x1c0 [ 142.120776] ? __init_waitqueue_head+0x150/0x150 [ 142.125550] ? lock_acquire+0x1e4/0x540 [ 142.129524] ? tipc_sendstream+0x42/0x70 [ 142.133592] ? mark_held_locks+0xc9/0x160 [ 142.137835] ? __local_bh_enable_ip+0x161/0x230 [ 142.142524] ? __local_bh_enable_ip+0x161/0x230 [ 142.147201] tipc_sendstream+0x50/0x70 [ 142.151086] ? __tipc_sendstream+0xd20/0xd20 [ 142.155491] sock_sendmsg+0xd5/0x120 [ 142.159205] sock_write_iter+0x362/0x5c0 [ 142.163264] ? sock_sendmsg+0x120/0x120 [ 142.167243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 142.172777] ? iov_iter_init+0xc9/0x1f0 [ 142.176753] __vfs_write+0x6c6/0x9f0 [ 142.180479] ? kernel_read+0x120/0x120 [ 142.184368] ? wait_for_completion+0x8d0/0x8d0 [ 142.188978] ? rw_verify_area+0x118/0x360 [ 142.193125] vfs_write+0x1f8/0x560 [ 142.196671] ksys_write+0x101/0x260 [ 142.200299] ? __ia32_sys_read+0xb0/0xb0 [ 142.204365] ? syscall_slow_exit_work+0x500/0x500 [ 142.209212] __x64_sys_write+0x73/0xb0 [ 142.213098] do_syscall_64+0x1b9/0x820 [ 142.216986] ? syscall_return_slowpath+0x5e0/0x5e0 [ 142.221916] ? syscall_return_slowpath+0x31d/0x5e0 [ 142.226853] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 142.232221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 142.237071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 142.242256] RIP: 0033:0x455e29 [ 142.245432] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 142.264805] RSP: 002b:00007fde93ee8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 142.272530] RAX: ffffffffffffffda RBX: 00007fde93ee96d4 RCX: 0000000000455e29 00:54:18 executing program 7: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000100)={0x13, 0x1}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae88, &(0x7f00000002c0)={0x7b, 0x0, [0x17b, 0x1]}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x4, 0x0, 0x14000, 0x1, 0x8986}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x3f) 00:54:18 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0x2000) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14, 0x67, 0x2, {0x91, 0x2, 0x4}}, 0x14) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f00000000c0)=0x7f) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:18 executing program 5: r0 = socket$inet(0x2, 0x2, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='-keyringem1vboxnet1\x00', 0xffffffffffffff9c}, 0x10) accept4$bt_l2cap(r2, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x0) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:18 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x5, 0x400002) ioctl(r0, 0x8912, &(0x7f0000000000)="0b5c8bac0d770700000000805ad428eb690000000000004b6be275149af1") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0xfe8c) sendmmsg$alg(r0, &(0x7f0000004ec0)=[{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000380)="af3c50f5172fe8a097c74f854b258ac92fcc9b9ff762f400acb869d98b0354195e30e21b1919ecb6be96584242f21ec626ea65bb1f38294c50e5bca054d1bc3eb3fb897e2ce5f9fb906aef4f5f49099fba64b837c18a9ae0dbd11203a448aaabcc1ccd2e0ffec9ca4bb8e4f099212b5983b98bb16905ba3c32a034da27d2b8e2666c5cac11760bb5cc2ef1aa03246da26104d8cbe64de9e6380c375763c985769fb9fdbc5574551d58af8225c10cd90ae5344bff2b879f2a316862473defb8711a1d18db23a3a9fb1b3ccfc5634897b3d1a52658d06cad967b1e52959b778bb1deb69afecf1a591bfc2f44fda932394a639f50af69c172c27d9024a6344db52f9f6e5ab6eba9ca8a8975085081af75605d92a374cfa5ab53e329e4a35eedfae7238546ede1de408fc4d69f09f4105fce9f9c390ea633a7642f3d67fc32449f0c710326670382ae9415f7b65b0b01a5b8072c3aad82590d85ac59cc619ec62c5991dfe1a2c8835c342df4516cd8cc4e00eb41465858e04a34acc0cc7ee10d1cb49586780ee69303985a01d7d4f040e61317f00c1ddcd24680b64169e24829377c4b33d93e3db57da8eb18fac0cee255db5d260f6da87e352afb798a079c3290364c7aeda4f360c8821741acbfe389e511c37d73017e6fdca30d980f7963ca533ffb87bd9b1e00a04bc90a825b0b131bb95dd3694a4d4ba976f282a0611c2001de5fd009fdeb31ac1e79656bcd7299801639bae8c55e466e2af7a6f0ae49d336fc666fd2a41ea218d3e2758c74a3b278bd9a4414c4690673fb914842728575e41f113dca9bca51c32a020864fea8757ea24544df2c8036131bf484ad5037c65155f4572151dc6af9a44cfcde188628905c252d7fd904bc8408ed97cddc702ce6ad31ce5d6072449608cb04030e7100d3439efb42984710df537d17a22ca6ac7f990ea06e3802d6cdd6eba691c92b52c8f1e1036b9ac9d7965879fe1c9e09798e22f82a551e6c724980e2df692328c88c14efd72c57aaae9dfb224b1bd4929b6b4c7d202985778a24a8d1fe43129dd16db443d353a4e908e7d9580161e5249189ba725b8fbfbfa368022675a7616df52ae712abcf34848b5cde87dbaca8bc2a0b9b3351950b6807428a67c66c54f6e08607a18dc8a311cb3993f1350a27ec2e6356743543e3dec322702ad546eba5bec047be61ed335c3c1341ba27af994b5ea41e119ffacad54ac09d91fdd52f00ac27aee898cbf0f687bdddcd309f3d05810fb4e16c1b60b7444c48df8ca0c1edd0fa85496adc04931aa9c64633013653110c4546c562451bf6a4f54a3473ad2d4c6486c5484df0910f5b7a2fb707309058ab5ad1c2a6331e250cc34ccb6bf46b577a79643e83adfeb7a7f541af5e4b30447c219b68e613eaad46f8fdfa1f0b1579ae833c8a3d0657be0adaea3be18b3bd44eb8e81d12905a66b0d2f252c230c77a6ce6e181c9373ef4cd647bb17c4493fd2c7661004fc2954d0e731f339b8f32a13ccf18a753137a45ab4f22763fcf1e491f828f5f28e6a3b117039e7490163b07e7c129dd80902f873a14f2cb37620ca69d2017c75fd964095b8da625f42133cb74ddd8f96559104475b74482ab1e0236a88e1dba3ce9930f5ba05259a542f07e3faaf9f53085672b40de9122ff2537d1ef0bc31306a7555644acceaa31aaabd2b3518925f1e37c2e129979f884aa747ea159dee69a2a5b8bb3a8760ed08e5820b4d187519caaf0a32ef95a1aa8db205105ab47c19ef6f295c072fa45bdd04b04881b1ddd002d24ca01c40f9f26c6b89412bd23abc340dc2495f6817c040cde04c62fbc53b8dc68f0be29d00ef1cbaa569c651137a035aa8775b044e4d4a40d1f121c4d8e57f971334831be3a072e2a9eedbaef422ccb9d9fed7c4d6589dda18bfe6356e20411ee8a8a6f05005ab5a7c4c25a1db99c3f33978a618a9a2ca458368dafcce7fce464c0e7e26853ceb04c3e67a82f6d05ce6152cedc7eb0d6a2ff893e4a1be55d4db5cca24dd55d81917053d4b3df3dd90f48899b6ab4d70da4e4f819ae6db04662e46997ffd37e447c084ff0c5f184f0c72d3ccca4974e2884579c2d89f1a9d791b1186881d9154cd51068d5963da2b153ef3dec0e86fbdc95ab1bd74e1524c631109b5b06a5fb7b10e15749cfe080231b24c9bf4cf8824d54121d1bd805719b554f389fc5ae89ac9565895e98f26287d60274b40bf43b025c2324cf00a395e59eed517db75fa33005e98941ad8434a242a7b72b462bde461da7d92129442d498389a87ad8b72ef1c4b2ef44e68069725f779e5c7cc2c731213014aba4dce6f1da3301fc051206dfc0a285adefb01ba991317233061504e30151880e7f4f838180130ca1f153be80f4ec1f0ccda943cc01fecccf41c16673bc995815fe905fcd0897839e8e35eb3a194b81183175cc89aa6c3ff63e25c79f77487d2dc8bf56dd000ba2f41026426d2bbbff2a4b442d936aa00db8bbdb7e583c544f12ce8c6e27197e2f1b7d30852113679a269a611ccb1b8854482ab1d6a626e395a9d3f5d1639f4a376239447c2cc1d2b476f9bea09bf7e003e115d47e1804b6195be5e98e0d777a316e0f259c1622ae28cf17c2418bd734aec377fc1c737b0972a45f8a8461c70da97c3be552a4ffb1b99645d4086e26a81f9ffb54bc3bcfc8791f00393845da4f36c82d8ab393db77cc79bddc7c1c9b62a9b140eae6abece0b4a1fb7e08151bc57aa4f2411d320da03e42fec17b4e1f1f0189ef56dc9b2180ea8262b0ae54ba8b893cd4411b1c1b815cb232b72d9f01a021e42829628f9350d831e41872b1ee6b53215e91f478ecb6af255d36c4243f53d97f73c0fce56cb4f94a4531a27b4937435a8e185d10c9902802f20b657d70a21a9acf543e29050b8049944ba87eaf8420541ba8f653af76d35b9a57e59890db16dbfa876d01845e003e67a396324d0f4985ba2b2054286d8baf98889be2fdb46640f40a0132c23e8577e53b88739c738fb46973772d55d3534184dfad9f8690ccf574bd32a6b71ccd929cb7705dbe5e47e44d850052a05927111263c00f484f0441bd688c0fb6ff47cd1c53c11b09ecdf6010e41aec95762161252f214abdd2f0c0cfd0883ad9e7c268872b0bffd8c899d9401e48a14e11c5d002cb220dcc59e805fe9c723d4c2f2d008e18a808d3039d27f62f08223118fdc8e100c204e2619e5a376274f6c975c42e75e0b845384bf5cad33140f1d18bc0c6f489fda37a1607841bf48c19a921a6269252d96e14f340a9d0ba8f58748624b2be61d452eaee7a5e79e3486d9b2ca49c1af135e6a333d026013df598bc84884b83953701d25ac8046039845da877805a3b06b0b4612dcfe371792b15995d6520d80107a4fbf1bcba663f199e10eb7c263656434ceabdf3053af1eaf4796c92c6503d52673ec1405db8cb9d0508bab40cfaa171388a7abd13675a7fafbddfcf5e905edf994fb7b0565c2d5896f5071a80eca991e857664f2ca5217587ec937e083d8f9a31a7f767952dfd5a1869c731c50a3b11fd5d02211590b22f4eb519a9ebdc0b35436a7cb4de11dcdaf502e6b9f847ea16ddc95d05909c5494829608b8c2f0f02fd86439d4e421afcd6271bb0d2376a2deb82e0352dcc63711a79b06d4d8dec0f1db0e35d769d3324922a84db709ca3112c2be3e0fd9ef6e5b34244a5202d2de1675397db343e7fe22614cb6cece7c2610803815b5571dbd494deed07a7266a18420567cc79e38afa3312019a6f96b8180b6281b45d7625c92c914e446177e1ceed4280099ed8da7f36e5279abfa6ae76fa0778847fb89d91fc672946a4d9595836eecf0bab21e698c41ed4356b49a19d27b0dde6c19cad35bad6948499f6099491779245bc4e9d8c72ca3b9251abfaeed5890efdbb51b2e4ffa7290d84329cb4b5a4d6144df7e1cc1e64dfde7c53e9e263e2f4adcc5c22cc96f6b2447de276835d3b0ba1ed461248f6e6959713feefbef07a1fe1315036a501b73368c10ef99afaa111708517839745dd7c90763f186c8c5deac5dcd98dc557b3aa61699098c35f5245c98463c646425a9e979c7e28b234fc12e47867527eff3ed0d7cc25779c98b96409ad14ca9d7f36e94f70cc5400f991497259859c70718b745cb655b3fd46ba5a37abfbbaaca2ef5b8806009b4029207f9279a2a823fb0f2dac42e8fa1e841fb408da8340d37c73ef3eea6544649e49cbcd42b2c497e259e52632fb6a2bdcd6dc999d359e4726c98e66f80f6a3e633d56d2a96b5d4cc40993580765712162c1ad04c9480b83358b5279dd2e49b03d5d40a74ac39fdcc7fc61c5c77241e3776f6dfa039f31ac3be7786a53488b8518c39ffe6c4f6d6ab7c01e761aecf882d97fe099441135d82bae2a4fc964c00970cad332c9803a8872a7680b4e46e26c93341938a6eaa72d15861f49e5d83206afe5329ed349bd1e6fa2e61ab69b81263888895136936428961affb30f3643532f88ee91c61085d5073fa436cd5cdb71b1ecfec01f8caa3eab0656f4e96966d0292a9b47d6a2d16dfee7848ba533f20293b0fbb3d0e984ce48c66c1a84154a0222157b097aa667e5a2598b8655548d867a060645b0ddbcf7a9f3f444cceb03658e6e9b3a1fb2fecad8651defeed9ce5770f346e5ab83da9431eba442fea5dc6b28db561cbd56ea07fa6ec1f743368670af0c68fbd9315c53fbac21dd1f690f69a445563f96b0d4ec72c07c12506cdd2d0cbb195c3d09cbe024f362702205cbde1bd86dabeaf6f6358f44bbae82661985be46df212abb5c58fd5275d46f3829565f97d1e584c9b73e23c7ca9d2c6c5b8f31ab971fe4e592b3f50549fa19a65a81905879cab17d3875dfd973c0c1f8c13e0430f973b959a7dba273c01a65e5c967cfacb2cb999d41f1e24567b085823cb6326ef42fbb9ce913c89d7f1109ddf636fea6a5742b2368840d19ae28300ba1e2bb961f281e3533e72c9b990c52b9557727b3886fcb4d5e3e732e40ba9a70d84a1fd8a64725ca6f91aa23fd13e07a29e777f085c09853a7d5936f97e73bf8b4608adce4209ffe3a668bd99dac6c879b24ca6ac9abae9dc93ebde0d254c87984ec4070eee36524f7fba601376411ca9b406a538dc2b79a468ff9b85b69e5a3372eafb8dd36f3f68a3bb0d1be98dcdc1656d30eee29e4ca9824455f183d56a11b90b5cd91e574b675e325ac322dd5b7f17452d1a9f35f42505a84138b54d7123923f170e1bddbf74554140a294d2582023208e773c2f3f3e21a730a7f1e5148525c9bd8d559b640ca6788018f5d88c788dcab64fdc77978ab48c6aeb835bc8af43ebf8807dc078f4c0e9f0cdcad6e836ec16b9a27d538940a4b16c0c266692e2b1764167397ec657bf934da133a140150f174bb207cea07385e892ebf9257d28cbda873b456ba1d21f09bff7a2bfc760ad675f5e65ec6f7e3dcb0075ff300ea1e053ac0a07a896b957322a2359f3fdbdf134aebaafe9663efc050b3e1164de0121c33a1392946922e887b9e0b5a0fb20e5009f5c58a9dedfe749a72d901cf635cb5534bfac75b311e83d0772c37a6561acfe60bfd289649a2e8b391be828ab2e4fe2f7c3de6fd2b22754de683ad6aa2e044fc6f2cccb4c22cc4a8dfb8abb34f17c088e808ae8e504cdf7ce8eede467aaea1f47dbe6a136d8efe3f529ebbc9e456ba883284d2bd0c3c905e0098c1ec070c94873942c9594ff52be812cd9ea63fc17302650de13ed06fbcbee6db385c2285eab416d21d353e676e4eac8aa8bc50b", 0x1000}, {&(0x7f0000001380)="068daec09c31af0ec084fb9704e197b644df7df7a12912f1a3a27ba27ae68b66c852df4940adf00785913a2ac566135b8b3206bc7d", 0x35}, {&(0x7f00000013c0)="8a1736cd0101825fefbe122d0b8f60589f44dd7d19067d78a1cc971c17cfe67c1e803853742c412993cee166588c8447a4e382f35996a9817201ce7a955247fcc74a2cbf4a13b425b40d4ef624d8e3558f9eb05d04d26034f51ad3ef58143ab1c3da950694091c1800dd9a620c33efddda667689587d995eacf6701ed691684923e9516358f621b547f865333108950b49a61707473bb68a99c3225d4250d56b", 0xa0}, {&(0x7f0000001480)="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", 0x1000}], 0x4, &(0x7f00000024c0)=[@iv={0xd0, 0x117, 0x2, 0xb6, "4952f710ce961ebc3f041ee84286db7fc603f067c5c39ea1f75d02128e9dca190c8dbedae38a185335a78d9f2ad6477f8d4a43d727eacb50778d39d7a1eb14ee6e99d1a59f94b50451deec8992ad941309e697680fe4667194205090391f6922110b3c7e296f74d01cf92e8a63786e1c932a324a5dbce6d55e0f07a6811072a68706752893231c4dda62f7c0576f043a6a5dc5261556120f5a87c663377ca770a78a39c3c6e3c1711df60360b7fd1b9671a18f2914f4"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xcf}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x9}, @op={0x18, 0x117, 0x3}, @iv={0x18, 0x117, 0x2, 0x1, 'w'}], 0x1178, 0x4040000}, {0x0, 0x0, &(0x7f0000004800)=[{&(0x7f0000003640)="d27dab7e6358667857063ff5089b966228614803eb924d15ffb0ed703da140d1ffe489d7b13002ed5ebf4300e53e9bac89d6cc969225c5a15e3387be843d1db01ca241e1e18d477a55c4cbddd986a298484960b3cc26c8afaad502cac308afc1b21c6af0d06a1025d7534ffa478e83160f6acf4a6824e880baed02f988f9f89a91cebc6449896ed922e8763f28a89718e04ceaa0bb05d9685db2f94336bae322d9a37f89b488736100a3235196f8a4e00583d22f9f63549e166377234f94b1f4eb955a176a9e4258adbd921ea395e9d1813f7e4b5b19eb15ce34f097b659a7e330628fbb29f8c70572a08e3506110aa1ea6601e4123984c86482db25420c020bd452c23e12b2467da9b1372da65738e8fb86c0158a9bf4cd6166066ae2a4562ad1566db8bffd4ed04cc7de1e3d04cc7b46bc101b039583b19ea525eb1803df881d3d207ef61fdb1d8a9782120cb4924127f873476ecdbfd13c743ca08001237600de2d1f79a28a4e56a27dc2cff3712f72376a7d317ce075fffb75c81852cc375f0f68c3c4900241567667287dcb5c1307a0ef1e5f99675d832af282dd66c55651fa7f2cdb4e83c339ee1bde6f050d29b964ef8eaa30f24cf2125a5bb9cb91c94d7bc74510ffec8591405482cc1c625ba0a193ec8c55673e6ef5568c938a4c5647d3999de3bf4e21fd885f247dac4ce5009e597d2df9fe31dcd1c7c36d6e0567c16af237e01add96250e48522a2449f78a4df1bad6b2f002aa3bc1a77f9d0d5f46b54e9e7b3ada67a35f847441e7ab8fa0659ca6f729f826a42e806fc7d26533653bb6e5e364f4103296fe7081332ba6ca980f4cbff797e40aa4c175d1b09864bed276d79fd44616d77b69443c17644cd849e119b2c6b889ff4413ba630fc57014fc0e1bae33693e3442fb5a06b3ff560e2ca6fbe98a326174de34eb659b7b78b54982d1aca713bd224e07cb097fff0da0b2ae4b52a3fd2d993bb9dfe71ec6c0462455bff8ba56c9a0420ca2e93ce2a1331dc52f69f87fa672943add7bc4b6f3295d05dc76fa2f8a27e4357e342ba22ca3317355a2bc28acd3f7cc95de61cf268980280e06a15bffd4ff235dbb114e0beb939a929b35b9f3f99c3197e7db19358ce5645b59180a9ebf3d5a643c686f8e9fc500a9b8664fa99b93f73bcee9cadbf23020c69fbe2f6bc733638680d2744f996720c81e682d59930dbc407d843e00f88dd622fe0574409641d168cc099893ea7ee7007294a1a77ddee64ce9924135a24602a11601960551dd6351bf308b0c2d241712b031e508e4592d145ee63c1c932faa9c1bc4a8bcf8f7f141a0f7dca2702990f09f6b784f315eef88cd2df6ffebcdd127eeddf253d016fe89d3584e39f7b0a1863bd93055c4150a24f4b67442b19ce08ac06c3ad61cdabcb7a8d7d7bd94197b6576de58b2b4196712e5f981f427225d4ea32580619befd63b9beb8b898a780fd33ff8ee4e112f5bdc294dda9c86b2d8aa9187ba4b344e1ffeb34937b9d61fd2f1b1c057789316c9edee89bfb6623962e36907884d32fbb775e81acfcb7a4cae4ec09eef0b3c8ef6d1f5863936ba8c9e01e3fcfe5267db60e665c77bc94dea47acd4ef081f7c57e85005da69df49391d633a4cfc4506025328339421e29a3fecf9cb0f283b34d14c2b232564f148e309fb77a541189fe2caaf478a8d06b5a37b6a94b2a9b261ba6cc2f1395c9b75e70030c5e58250cb9aa32b9f3279ce49cde684eea767f198e3d1629999c9633506cc4fbaa5176597c07011d8f30c836e5798ca14f3cdafb551c6215224508d0716ea280c899b7a01bce57192e50721a6d66eb0f2a053199d54cebd5a62acd1ade038088e95c18e901ed245190bee0eba4ce242a3112e2ddf6f2b9ac26a3c6016dbfc49ebe04a7e5dc894fd1891b663e8d58e05a091b35c44fe9096d6b841584ba25ab4ef1c9dc40b5fecb2e2439125c9541e3a369deff8ef987247c17efc08afb246a1c5df8dc85dd6bc25b9756809a44ae2d6c98af697d9fd3d2111fe701312bb068cb8fa7aef6e9858cdfd9875fe5868ac2863a4fed5265b234733868a86938cc5796f09f23ff3322238cc8acd471a5de772c4668cff2eb1e78dbde1671c154b6efd8585acb8cffb35919324a5f6874d187d819fadfcbfc5d4cef81410a0b219f4b38ebcafc6a6a69267192fc6c1b697078a9384d8ccd9f044b39f88e5f3ef78fe5d8de4f424309cdda216a99ba3814f6673e1beea86a39a42c6fb8e4e9fab9ad6a3aedee84b089b26d4719a27d17a924172274392fe98c5db7af79a86dd854624322a20f34e4b1a392c826141cbd15a7699acdd6aaef4673c15ffbce018d7a2ffafc1f1e824460e962691f837d22881a3f7611c5820de26c3abae792bcb42062e4cdd52d828939172263ce1c9ea5fc10ac62aa705b77e65694d5337ce2f8af769902462f666b08641890eaf4fd770db389a6978286e96dc8328123569168038c022bfc0ac930181da1a21dfc3025c0245390cadc0e0891c2659b6f715eeda91488f22c2b84cdf89741c58851bc5432d838865386e1081126984a176cb3ca8b6c8cc6f15d5a4677c1be3e518572ec0d6fcec04f5d68c0801ff763bdf0cd1a94e9f2019f823824713ab1bba0711bcf74365ea967c8d9d9ccfbc79f9c1272fe865ba4dfcc2be94bb7e376d60febb2cb4f4f616d27e3991a21ad7948e2e32eeac0963042f6e6cfaccc6ac5621eecb9a64b9e4a3c1ef1ec79372a85990ce594eae25ca8ed8ac9ab6e97324dc3c65dc14a0d10ccedd91ae1c27242749de7d39158dba75fae2c86c11176a174b91e55d9884a931a02d145ae6ff23ce03070ab7fe89b77cfe79f640854453013d9d7b3e0d61630e8aadb55885913fa3ec1992f2d6be628efd34869d2f78e2ea24f12bf66d5686b9ab342197dea703d0a8a2e30caf5108a7f39258776143a34b350e6ebde59990288c33fc1503564e09d9c54d356c7a2fd38272b0ada6883d92929ae0d5931ec2cb20c0c6f5e2481ce2a330cba7c3d6ecf7f4a7464333442f36d6a9bf82ddc6efef4dd2d58f9784ff31d6f645f1aba4b25184fbc7a3692d80bced3d2ad2b43e127d44c219f50f950f8da7e46f8e77353b5d9381a93a2762ba471af4b89fd4e0ef98f2d26bab337bc4ee1b76c242625ac40337eed1dff9366150a9aa20490a6f035422d84c7660785380170872fe343a8458f2911639a0f496495ffc3fdde0802caede1ad1171eac08feb0b6c94781148fb0ecdc86deeb170366dfcde27c5297c828b9a53a3d1c95e2303e5cc05b8164c016de0d2a874864e98cde57f2ba7d8b8aa3106bbbc70e3dc7cb5e6a77853e1e5ab3e84ddf8f178530692bb8884f926ec069df30339137c2af96498ab0cfaf246652eee37812d46bbc383b294c90ebf059755c2c1557c446adb3d84c74fc2b948ebc5f63a879f714a0e316ef4d74b181a19f5579d254ab6b2df7f7cd49fc7c02dd32963de69c3c23412b47aff52c85bb9a26f30f0e46d7f61f3340dc1ce787399a3d94b491ff66b1b2324e1a32eff75650dbd6b5286282130ef5dfd8dd0ef513d30783914447432624aaa105d40c62ee1f271ae2b0ddcc139defd92d568d8b054bbb868ab5870092d1e43b1592dde753205d8d7d8aa2050f3e4d455c06f70a0d0dc20b81114b5487ac2dc123b958e02a966144f36711866b32ec93e90ff1443407891c06ab410c613f0469daa985e6a22de4619da5652057281c83bdab5f0df4fdbe9d65cd620a19acd48875811e2636de12860f7b56bad73c65da1e35fbe2f3974c07b4a3779a6792e2c2460a5a95bbbd1bef5b78abcf461e79a86324baeee1542411062778dce8febf92d8a2dc1b3ecefdf25c32c8e45906e55c1257b80271b28ecd3953428a072df6dc005efaae7629e8106944288366e28928930bdd94a9a7d5d69d58929003d0fc320aaa914c079117ca9d8654dd53b4cc8e11934b429d4bb3a8c31dd840875ab8e491cc2a6e7a9d3d8ef135e803c580ec5bfe58f538ac57584c5f5c84d96660e8f765a611670d61309a57f872c4a807c3353421ee93648389f35a2c08061cb491e9d3c6ef7171e2e6a3ee1dcaed145ff0ba33212b9a755219c1e77c917c24bd07ea653afef6d61db663d7a3eaf7ec49ea3048d10282e64dbd1fb197c3bba4631bbccdd9b2866d96a8b8c27cb1b56233f14d3acb4978ef6ea569cfea8f3100af493231b3b729af4a335445975e3b8b7f484a42a752018191bce06b6f0734a191420ea8a342a95ce60fbbe390178938ba054251fc898e3d32884cb8e33b3c2449f9787607bd5e3649fd4fa8f104febdfac8c97c0626942a3a2754b039c3771e7ffb7c833e1906ddc33fc3b709f5ce60ba9b940078536409b831f21ff19c9ab6f8ce078ded4f4b89872d0d75c1df98e85c3fc1d4749b253a15e4c1df9f3c99e952a9c90a4184dcb38b9d6ba438f81ca40c8dbf406151f4bc2c697059761e5cbef99b054d11097ebbd3e0964b8981a1bb710264f05d440b049928387523f771a41a0b0eeaa0b12c194892b087c21e2eee91f704ccbe1de68ef6b3af63038813f5669dcbf6bfb1eba5d3d0420f340ae7591d3307dd90c0ab276de89922a7a277e75f07bdcb60cd89e09417cc5bc22adf71066c6044a4863641a9eec45e5a2b7f1b1a7d4c4dab91454b5822e3c563b2815a9ef25d9d31f69eb25a5b037621ceecfc7d8ca16c59226563272d8487791e1d7e03db0ed33c408bb96c917816fa94fcfc56979bf3fb26ca8df2c89b364875027c3f2061126a81f9f35e5ecb660852e268e48f496b66c1a3b652e08148337c8f4db5e0ba5c55832228663460897c797f775cf11e8b6acfcc91fabb5ba6427ae4dcab54995e4249b6d613203ff3cf63e801a468680b02c5526c34347f30e8e8a07868503f30d93415afa23becdc90c83ae3807acbcbbb308ec9749aa2cc2df19c73e521d0ed225a273ebe94b7bfa0b12fa461079841db8797c8ded1c03c0c9f8ec1d2904f8ecde3b4d69db4c8631f7ece438cc33939f62af4cde961b04010108db30d68b717962381b4f0c1f1cd5595b331a4d02310545ba5e9e6afa09bd45c596c44c7cf48bf5aa3f61f0898f48eadbfaec01283b216e59d71c82774082e83ccb70199e9977c8963fd153e807e7185994b75b89769d0c9b742f0ae07bd6a060fdc30ae0b5092fbebdedda790ba0cab9a0e493164f8765c60e66729ec6a7e4ada3a12f0f297dfcfd984c3ecda4c42dc30dcaab2e286ae8ed23d04219501d3684b4541653ddca727006850f6131f6c81d1f221315a80b4b6e7a14d0edf25d5ad6d47713fba2c1dafecbb33e5f318eb89b0960eeb6fe1f7a015fb1e55e04140416ca0a7c6f8f686e68b30f01646e3347d44a9cce17bf040fafcfd684d3b8b814d6c5f3a918ff857ddb9ea8198c4b4c82305f350d85e77c981c9558433d026d83ceed064abaeb4d1008212d17fd1483d4c44b97302932f16483b380eeb635b1e6e1fc61b215627394d2646608c85cf33ad9fe7344ee79429c2d5bc1ff804e431f2df373ed255c85f6f7b129df424288c57028d69d21b6472f85e120b622e0ad929299ee95805a0390115cd77e040e6ff7b4631d2ade3edbda95ccb4d5f2223c2445970fd0cc54d08a782319ccf879e53b5d030d48bd1a39d4ade5248d23f469bfccf86d3dc8eaf04d6de4ed6ae975b9f5524c93990ca25fce941e7768f8c3693cf655ceba74ab22bad76291b5d48b0a42943100910d1fabcd953c06470472fcbd4f6adf90c11542456aa", 0x1000}, {&(0x7f0000004640)="552acc54bc31edda065c4a28e5a72d852365f2a66596eb1521c681d1f1bf87ea3bf271d707e050d8fded893b68c860e391bcdee8cb0d164a", 0x38}, {&(0x7f0000004680)}, {&(0x7f00000046c0)="cb1ed8ecd74f83d9edb1ab89555b4d522d1a10", 0x13}, {&(0x7f0000004700)="cc96dfc161ac4feb667db8aa76c57d11", 0x10}, {&(0x7f0000004740)="79e424840862e3aa23045861c13e8ff985e6c34755381adabf16ee7d1aa456bdb898d8eab06d0b1b86d773def4ebe86e69cc3248cbbb45607621a6710acddd93a85b90ce2894759516c0ea73dfa48df2a4639201dfe0db639e", 0x59}, {&(0x7f00000047c0)="bcf9d98d4bf2360b18b838d5040c65bd4677c21816a6799036ba2b27aaf4d66e05d351dcce12c3ac", 0x28}], 0x7, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f0000004a00)=[{&(0x7f0000004880)="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", 0xfd}, {&(0x7f0000004980)="50a2bc64f5749e136b34aa1cd41b37a0c22e874ad24fb2d1e920430f47ea8ac3010f8a75f5be2bb07f239af46d03919de95acea545741a549d8b3d32f7ba2f633cfc166a9fafcf20e1b3e74c20372f6a981007", 0x53}], 0x2, &(0x7f0000004a40)=[@assoc={0x18, 0x117, 0x4}, @assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18, 0x117, 0x3, 0x1}], 0x48, 0x4}, {0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000004ac0)="e6091ad72705af01dc50f4b68c023227f298637697d3399dbf0e5f6cfa50d0cad44b2f3421be09ea36ebc010a676b88d861e3f521c7306fbbc9d716e9852e0eaf9db497bfd40d23bd4b801d861dc82e7496655e67283bcc5e437109ade7db50352fd2f081a99115bd830682bf4ab", 0x6e}, {&(0x7f0000004b40)="31842881d95df394c6f7fd51000dee4534eed404654a7bb6d874e59bfe4d0685627cd95fe6780026200f2613e4c336761e2aff8f06fac2ac8942891cf9a43a5d3e926a31f78a350e2bd8c4f31664eb0024ebaa8912ecbd08640341b161bb98dcd2ca7110f65a2fd291be5c1b94e4d4466959a1ae05d241d068466ec293cdf2c2b47a19782c55135bb99b429411cc7bcbf88561ed6c8f673e74ba71", 0x9b}, {&(0x7f0000004c00)="8b6ab8c174d024e420fc5d1a574f6e7890a45fbc25125d8b37ae4c16fc5edbc3f5f4a74fd709511b0d9de6b5b31f73544efecf5e7a92b01ab52c7d25318dcd9b0d2dd8afacaca48bc6c7f8633689d21eaec8bf00971981f28a1f6532a9ccc97f93303bb2b52c2e891a940aaa10cefd94a9343d514839d328f188d4274dc3431ba044382d9c20f7feb448e434d8e911735d40128df6c0420c044c6ba1db2c421c982acd286e9922dbe3c12cbb3c5210a48d73dcdb9c676fc3ca139d12f8f30e9a0661befa683a0686ae20db314869b6cd36b0089aabda7732288e568a3a", 0xdd}, {&(0x7f0000004d00)="083f47b8e4813ef5ffa78ea6c5dce4812ec7770e97d0b2b93b5bdc5e2d084e147d32108b12e30f24ee7b1add3433e5228901265f25c5056d0e3feea1a28e72a40c04ced65676547699884e18ecc6cb7fbd77dc41c8870674ea2c15d90c30d47c6aaa0097b8292ae073a2b3573b7f725220757b14e2ca84d4a93ac7a44858ed15d451d6bb57630db0542b28df739116c719505e0486e2ea4eed9304caf66a2074734d37ba5b919b56462eec447198bc5c96fb8a3e1376181d38d1ef1c9d36b14aeef5458a79e3dd33c6c9ca30a3b1750ac0d19b7dca5876b3bbed3e995c246746bbb128a560041e41cdb65ed994", 0xed}], 0x4, &(0x7f0000004e40)=[@assoc={0x18, 0x117, 0x4, 0x7}, @op={0x18, 0x117, 0x3}, @assoc={0x18, 0x117, 0x4, 0xa0}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x78, 0x48091}], 0x4, 0x0) r2 = accept4$inet(r1, &(0x7f0000000180)={0x0, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x80000) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000005000)={0x0, 0x1000, "ab847ee076e447dd22ddf82997d5fcc73e128060fea90688e04a3730f8255a48db58b65e5a885f4caf3a91bce1ff33c9fe88ce754ec4e648e575f91c1a16976fdbe12712ac8950de8a2e3d88b2ef69f4a597e2fb98c666a679b092e06ac199e802783edbd26dd9bd0ef7aedb9034065b8a79b97e15dd74c3721d9535ed41b50b73ac1276ff665869c3d33aebc01ba3e4ffc953522709cff9b7b445219264d0bde62efcd9707bf59df00c4e33f78600cd4ff8e8a92b21fcf0f0ee79ed99d74632568b85275853659361c27932cec66b5499e699d1392857c544e7480945b717c43c9ff08992f46a52dc0cded47c06ed28b0ee10543b609d6b994500520872c474560e7c012a01976bda272c9db1c4f4d03187b5c6492cb27d8e2a77a4030f082556949dbb36ecb246d0992eb96fed2502d7821e9343dbb626c3bed1616e9a3a8fa65db6d7c3634219587088dc2c3e05138ab8165bf8ce135104e954028e1ffda9e3473a706d3cd36a754f070935e05b21371a6404a7522a509950bf35e2041e32716486e95392481fc30ad5be5fceb557becae791e85186cde4d7b5047094c4deaca412ab403ddd21cf720ca92e43b8fce6c5a28eef379545fcf493301d457493d11aef53c9a0954927aa490b88f01d751f9bfd1ee3b4e9601e9fd5f04aecfe3c44b584cf8283174c0bce602ce7787de08f6c42a2ff9cb53bee59d7364a2fc2da67494b34bc811c4f933ea50571493f7bd230a38c4b1e1e21b76fd5fb0a5115f6342bd7cdaab22f8639a1afebafc4ff3b7504fa4e09f19df2fc367c13cab4dde757f06b6e8c21011f4b7a5fd46318ddacf8af95a9d428dcab4b8ce7454a4e50b19709998c403fac352ffd13ecd78ae73bbb64a7391a74c5b4b4ac80002e9029377aee79bf8d069ed98a2b0ca03516ce1dbb3fd9d5ae39da2d94bc26efd5f73e9038e6dc941b383010fc226068f4d98969768e9faa72a7e357d26152776bc72bbb7425a175fcc9f4a33daad0246423a1fe0d8a9804303e630866bddf374c3efb91213111fd843b1dad34598b960beed0fd069708abd8527dce0150eff390b836640f8b46b31df43aa5483d8dcebd4bfc11d350f37756b8720c3d0d2b3fdcb77c96075857fbe0b0b27fe331a2a3c175a5afddcdfc10f50177736d82abf5a2c7893bda658e8d4373447affda0af819b8dc8dd56844a7ce2a8c9a644ccd6846288c34ba75b0c0aa6b93b6d37829980a3e1e82394dcfe3b8f2bc3a60a6a117fbdfb03dd0581fde25cdba954de366efed539201b99881bd9b432c62975c8d7b3a70a5747b71179d38f153329e1c99532edb0ac8494e42d4632f8a34fa5024ee87f1836db1b0fe0de7461159a6d96a8858c6e962d6d92a48c7261a8ef4fddfb229835612639474eb96785d27123c7c3f050195ba5c09c3f94f0b090284e95dfb2ad0cd7ca2184349e8b6734d410dfa1e3649b41c29b21a36ebb23a369adc6daa1431dfce2cc2a3bd17ec029ab78718b42ffa2c9b3105763bafc911d11eb922ed8fbfb1ea65619d7f940d4e8241ceae936e20a818a71d078e29f8af33d4d6115527dc9244d7219d0129ea7920d80a513eb186a45f655d02fbdec98c4a25a97433e9203453ad101a7a95e779f6dc109251dbfa1b2541cba728cfc3bfb6ccc9f630a3ca3aeaf125060dde9c6378dcf730f193181c9d23101aebc5149c9fbf8562e3a17e8ca1d1e2db82140f65b9310d3cfc796f2d3ed159ea1981acfac60527da991881fd63505098b74e6600a4ba019d15c8f7a112523d69232571a6f2e4392b51364392cea1389ddf327f1c0624e55251d5b439430a41c3b6f0cc0d45af948565e661042842cb2716ffdf5677e16a01d2ceb630ec59c4c7d4fb7bf4685797bf64f22b8b4ecd4202fb77cd76452aaa4f2ddb5fbdb7826e0d76d212db4fd331c13e4ba584b7a4eed12582649ef87061a5cea124ee6694ca98f4ba9bf7b72e044a2ef62d1cabb7bd58e2ac9148707bc84c36a98fcf1121aa21107b0c5be678870635186435f68bd058ea9c143dbf90d6c210e98058105236ccd4386b37c7c4aa5f7619204dd613d4d1c55658ca7017e91e6c22c000c5efa1c59375d14ac660d32537dc29acfe97f0370fe73b4247a96b16c7edab83b7fbd20d33fb7bc89701487cd8856d6c1c8369daa21478a4440f7d8c5a2d400cdb1de40d000fbdb3165649d3da435821ebf4094eaafc0126b41f1a1cdd2ccfc4da026c13ee3d196e4a74c01d2a5524c89380ceaf5d4d59a307a4d4d6c56688e6e757903c510680d0fb2f87a57afea8dc5fd0c5b7f62d465f1d5dce4ff787ffc2ae6abf24bcd7bd9b38d5dd0cb9ff80f31a283887b0e0bd35ae3f46b97a2823c94db12df808acbd6267299db5dcf65a7a3573be2ab61dca8f9db4261a7456c07ddd13935e82e34b471195a22ce9ec7cc42f31f038f5bfb28c10d216e811fdbd7fb23415cfb08ee3a2f0198c1d088c5613aed6091b5a7beec726d7f3250032f74eeec93e1907d2a7f10e11a09cba92289574dc02e0ebd05ef4a58f323910f1a10b902d9e54a0b6b11763ca72612dd9b9e2ddbdf86622107477e52493454d497197f244de23d057f6c82cdbf9b3345f2a33152a9b2362553dbe294b12d6e621f7371bd0eaf1d4cff34c8740d0260d09f8578820f5706fd02286f5e081d97b2e38ece6a1937ba8c33a8c0eb1e23436598c28047992d6249c2d357ca3d6afda6f2f6d4cdeef0c832bd5258d45ffabaca6b4719690b32970d622038c1178cb913cb412fca38134fcc8f91963ce75646519db7821cbe5b8e1e78144b7733a70cd0edae258facae4f290b669ba141c44de3f196936708df87c41d7531eb966c3c6985c683558f71a9767d6d53faedd293e6567eddabe2229b61b106682e5d3b0853aeb38e8aba8d718570726b94feea952303f781f64fe64abf881222f4de8de83eeda7fd17e828cdcf35b3bd7b949cb2176f56f2ee37cee0a0b993d7197f2c1a1e0e2e12ee738cf1ede1dd5c071c7eb5b548d13ba84ab8c064d73385b05cd2a534e15d3756c2ef57f2c8439dd3eb45b1dd34f23e1f0f03e77aae9efac28cdc060051d672a708d81133e0b78aa3dc00005ff38c3ee1a8e4d59ddcfdcca611bc412358c9cc927cc052ff1a61e3214b7f2c93a1814e3c25b786242271677321e6dec64db89e3e0f0a18f9f82b919957ff4704e01f40a91827ac4afc665a901ce966d0108661a646996a439a43e7dbb6e42b9211291dcf382ae3761f7738965c8527fffe245016d1da50c026321fb2412bd9d02fe1b6ad8e39e97cae318f8cf38ffa60faff2ad3533aef38f9b723bbb6af16bda028855db9add07cabb8212cbdf4afd18c5e3396cfd84c0b1fda84f1234ac54c97657bd31c7239f7dd2c364f2aad7dcfd601d4159d94b43b764d703ce66fb040c30f3916ed35006f4a36a5d718301a48f6b4268bf13c0966d7215cba6dc021f8a383292c593f0d650fd34c3bd13a722fc365393d80c631c4d2a561d9b8829ce0a8d15bdbe973bd652789bffb4ee32210127ffb6773d043c9cce35c75a6655c6788ce00375b6143dbdd4ff5def4459649fbb4ed3f99d06a699d554aaa8ad7b3d22739ef7ce8dd96cc73d304ff687007e6e340e355e287f76317b5a42ffca2e6b5b780411e626ff8c8e461a943695dfcb78e4571534bdd62e4d349e2c1514173fbf78e5623b2daff0cae3b92ba27e3089c74237e14df53144dd9ffa30f0f51daf65069fa25c96b3a0d018808e23c3bae63f015e036608e07ba7a48b13539bfc081c76808140bd8543c4da9324ecaceae9de8c027113fbaf44612f7b23a63ca57899fe9926e5ad1ecc2fabe4adbe677de2026b671aca95b2cef326bda58ba86ffcaf10f1d83e6412b09086865beac6db77e3de0381ecb316685b8b55dab30f0c06712508efa6b5b5ae258c7a5e951ac65be3dfb75091f6ca5248357f3c1df04a589d62a9686246f7e47576a0b6c66dbfb0cabe3cc5c3d3bcca12e5704507e8503a978217d191d78ac19d47f38c616cb69247e45be40187b69e0f485faf142b052ecd6deee898ae8286f5b2dd9ffbac811947269349cbd1d1e9940960759ae438519b591f2b63fb2d933b512960f942751d92ab070dbf01a3b503f214a4a0e060bce55b6c37e6049faa5fbf9d5a4c53410cb70e23b5b5efb114df37154f8fdd18c4eb66e2dd0bf10279ffe3424702f03abe3d7d380623696ed0c9d8fbf6e26abc4659592999e2ee3530a0b78ab04f63856c5ccd514ab18aa8ca15678954c2e5cae8a8d66f72553dba0a0cc5e8c75db5b49b71b38dc703674b23213b58203a9739519416717de481cc1a4f7cf93c50c512478ff0f68174c563450ecb933c3eef3bca3ddf7cfa5dffaa0e42aee42433390a526196388e0e95132790d30f4df2b6322e1f28e8d19b15c573730ea54ff46d90a5e91b41e7869e551c5c495d864c76e9a38ce61d61d6a43d9827c55856fc9a63a685aa8f7e53e2725e0f9693292a27aed09596bcee33be8e31fb1d874a3a80acd9a03c70a0f5bd33eddffdecb26e639201859c705ee265df7bf89962b8cdbf66e007224730d33d35e019fa14333c20a0a0c4dd1f959cd6093fe849671eb99d51fc48b85c8fa1c269ddd42bcbde4b4c6ba1e2dc4f920836ce6da4a88c7601accfa874ab48836d04811b3a88e98f04032d4e990ad9727521337bcf05e91688b77a3bbdfb313b12964fc0410d2284e4bfc1c15780c935e68776f3cb94277e0219671fa9416168ae73670599988898343f407b776a86de44c44439b40b31a568b911160ed67879c765680ea9f24bc33f3fc62d079284a32e7d82ca92fd0023f40b27b362c9ace034936f507e970a603f4dd5fa289d7b2055dea40fa60222f595e0b9f6b4f17bbd75e95d9d795bcd9b763fae7a468f25094f774328a0bc9ce85ef07cd92718e63b2fb34f7484590ffc9c05110239264eab2c00d07131425a0d76b13d324bccebde963f8c0d32fcee08ff195a3657b4ef4393416dc89c718617318d5823af06910481ba4bada4baf71b531970ba0f568954746f7e81ff7dcfeb7f3ec16acbd210fddce4f2fd54cafbcc8045fdd495e695132947c6ef78cbbd71e86a2b1d8fa9cb7abf8f518b5b55e8e963cd0210f519b3b6a6687e73ca8260e64de8dab12f05318a468fe765740c2b6b3da10ba52d80535cfb9480b78ba22f9b885186551efe14f96991c2919626393e122fd66592dfc309e0dfa2b2fe62bb3d9949a03791612b8ab6680634e3b64f15abc80fd91e9dc217d33b5dd0ac1faac10906e498958776aba7a4939f72fd43e95e489309c04579bde06d4c7639ddaf0b96ffab97acc8a5a18e9e5fdf07c56b84342481d3c907ba1e9d2571882bb9472889acf2fb73c854e400c62f4cc68924f57ac48eddc01f64746a613543460672c5dbbaf977dd56865c91aa4f987b13b00c0c20de8648ea67add3e623da46bbe8b469d241458cf27637d693249b1b43a909be530b0efade3bd3b18dfcf634e8cbe995337676bb3e9c20bb2784b8fcb31164e97a3674bc0877a7ab790bb66a5e22b422b7ddc8a15ebc66f34a54c1c5ad26145a4912ddd6e733fb80df858e25bda43c587a4e7fa6f347727c47e43b4b87fbf07dd9c517a117406f4efaa1ba3f145bb8cfbddf1daf9717897d3b4906c2f8e2e900cf33ec2b1a2ba5282a6e259d722037f586fbf6d36c26ae5050bdca0d433eef596cfad43428e8fa8032ad05e22aba0164ee1b36c444c53008fac3ebe3f855bd683826398a98d1a4"}, &(0x7f0000006040)=0x1008) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000006080)={r3, 0x100000000}, 0x8) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000280)={@multicast1, @broadcast}, &(0x7f0000000340)=0xc) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) truncate(&(0x7f0000004680)='./file0\x00', 0x9) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x7f) r4 = syz_open_dev$usbmon(&(0x7f0000006140)='/dev/usbmon#\x00', 0x5, 0x88c0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000080)={0x0, @broadcast, @multicast1}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x9, 0x6, 0x4, 0x865, 0x8000}, &(0x7f0000000300)=0x37e) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={r5, 0x5}, 0x8) [ 142.279797] RDX: 00000000200000d8 RSI: 00000000200000c0 RDI: 0000000000000013 [ 142.287322] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 142.294584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 142.301846] R13: 00000000004c8578 R14: 00000000004d4b58 R15: 0000000000000009 00:54:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8001, 0x80) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000280)=""/244) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000380)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'veth1_to_team\x00'}}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='vcan0\x00', 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) 00:54:18 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) lseek(r0, 0x5e, 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e22, @rand_addr=0x7fffffff}}, 0x3ff, 0x3, 0x6, "b3131cd044a093c881915dbf1efe1e3a201e6a7667e8d5a4ebbe2083cfcf8737bdddc292404d2abeb9d3e62bc671e481c04d4a938f3c0bf212bf97d1499904f720773c52e7866bfb96a3e72c9edd4276"}, 0xd8) 00:54:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_newaddr={0x38, 0x14, 0x800, 0x70bd25, 0x25dfdbfd, {0x2, 0x18, 0x80, 0x9ec0578ce14e5c65, r1}, [@IFA_ADDRESS={0x8, 0x1, @remote={0xac, 0x14, 0x14, 0xbb}}, @IFA_ADDRESS={0x8, 0x1, @multicast2=0xe0000002}, @IFA_ADDRESS={0x8, 0x1, @local={0xac, 0x14, 0x14, 0xaa}}, @IFA_FLAGS={0x8, 0x8, 0x100}]}, 0x38}, 0x1}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0, @ANYBLOB="000000000000000014000300697036677265305c0600000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:54:18 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x400, 0x0) pread64(r1, &(0x7f0000000200)=""/236, 0xec, 0x0) open_by_handle_at(r1, &(0x7f0000000300)={0xb5, 0x1, "e2d19e88eb470da4a053ea1fa9d2ab1cccba3819e123c3836280cbc48546dc7bde0b5a5842302cbfd95141f63a005d7de66be4f77b6a15fff2381dbd61cbc1863fdfcd1b6461f72bc4ea645fbc5446728554460855a002896285aacd421256bbcccf1b120988d0f4b9b1fa69136ff9ef71dec2a593da537ac05fe6fd718d577df397f13b3fa64093e54a91fafc4a8c6856a55cc2237194641aa2a933135c3548c942c3efb60a1b9909f2c7d8c3"}, 0xc00) r2 = memfd_create(&(0x7f0000000100)='vmnet0!\x00', 0x3) r3 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x6, 0x7f, 0x800, 0x1, 0x0, 0x800, 0x40000, 0x0, 0x93, 0x20, 0x3, 0x2, 0x2, 0x80, 0x4, 0x8, 0x1, 0x8, 0x5, 0x9, 0x3ff, 0x8, 0x1, 0x7, 0xffffffff, 0x1, 0x3f, 0x9c39, 0xffff, 0x5, 0x2, 0x56a, 0x7, 0x3, 0x8, 0x5, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x8, 0x7, 0x3, 0x7, 0x7, 0xff, 0x40}, r0, 0x9, r2, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utimensat(r3, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:18 executing program 6: recvmmsg(0xffffffffffffff9c, &(0x7f0000002940)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/8, 0x8}], 0x1, 0x0, 0x0, 0x7}, 0x3a1}, {{&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000001440)=[{&(0x7f0000000140)=""/130, 0x82}, {&(0x7f0000000200)=""/51, 0x33}, {&(0x7f00000002c0)=""/148, 0x94}, {&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x6, 0x0, 0x0, 0x8}, 0xfffffffffffffffd}, {{&(0x7f00000014c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000028c0)=[{&(0x7f0000001540)=""/231, 0xe7}, {&(0x7f0000001640)=""/198, 0xc6}, {&(0x7f0000001740)=""/187, 0xbb}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/99, 0x63}, {&(0x7f0000002880)=""/4, 0x4}], 0x6, 0x0, 0x0, 0x4}, 0x5}], 0x3, 0x102, &(0x7f0000002a00)={0x0, 0x1c9c380}) fchmod(r0, 0x80) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socket$bt_bnep(0x1f, 0x3, 0x4) r2 = socket$inet6(0xa, 0x3, 0x400000000000000) ioctl$sock_ifreq(r2, 0x800000000089f3, &(0x7f0000000040)={'ip6gre0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 00:54:18 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x200000d8) 00:54:18 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(ctr(camellia),ghash)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003ac0)=[{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000001200)="cfed5adfc3229b50dfe2577052bd262a", 0x10}], 0x1, &(0x7f0000001340)}], 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x1) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000040)=0xfffffffffffffff9) recvmsg(r1, &(0x7f0000b24000)={&(0x7f0000f7ffa8)=@alg, 0x80, &(0x7f00000c2fd0)=[{&(0x7f0000af7000)=""/4096, 0x1000}], 0x1, &(0x7f0000fb3fa9)=""/87, 0x57}, 0x0) 00:54:18 executing program 2: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RUNLINKAT(r0, &(0x7f00000000c0)={0x7, 0x4d, 0x2}, 0x7) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000000180)=@llc={0x1a, 0x335, 0x100000000, 0x61f, 0xfff, 0x7fff, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xc}}, 0x80) sendmsg$can_bcm(r1, &(0x7f0000001540)={&(0x7f0000001440)={0x1d}, 0x10, &(0x7f0000001500)={&(0x7f0000001480)={0x5, 0x614, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x9}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "bafb927ff2fcca2f"}}, 0x48}, 0x1}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x240) write$P9_RLERROR(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="1200000007010009005e000000004c5c5d00"], 0x12) 00:54:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) lseek(r0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge_slave_0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000200)=[0x10001]) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x6, {{0xa, 0x4e24, 0x1, @loopback={0x0, 0x1}, 0x2}}}, 0x88) ppoll(&(0x7f0000000140)=[{r0, 0x204}, {r2, 0x8}, {r2, 0x1}, {r0, 0x2000}, {r1, 0x440}], 0x5, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)={0xffff}, 0x8) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0xd28}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000440)={r1, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x2}]}, &(0x7f0000000480)=0x10) r2 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$revoke(0x3, r2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="7c160a00800000480100ff193b8dff030400c87402000900be3cebb36a9e1a40bfa4e5619a1da171cd55285ca500b8b2be32f29568a2400dd1cb87ca9e17"], &(0x7f0000000140)=0x1c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000200)={r4, 0x9}, &(0x7f0000000240)=0x8) 00:54:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x40002, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="8567a187a162f28ad26be0e30ea608095b8a449859aaeddafabbafbed8588bf41dd3a286ff365f16c66b7f9859da630c9e03f3121efdf3d4a8f1936a3a872551ea40139436ebbc044bd6b13366cbeb8ed59776068df202bc2dc981d739faa38b3560b29f62876790bb323f66ca74c73ad3865c986b65ca6f0a8dba5ec34cd0bcc100437948"]}) close(r2) close(r1) mmap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x8, 0x10, r2, 0x0) 00:54:18 executing program 6: r0 = socket$packet(0x11, 0x10000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x4000000000080003, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000425bd7000ffdbdf25040000000800050001000000510001001400030000000000000040000000ffffe000000208000b007369700014000300e00000020000000000000000000000001c000300080001000100000008000400001000000800030003000000"], 0x6c}, 0x1}, 0x41) sendmmsg(r0, &(0x7f0000003080)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000500)}}], 0x1, 0x0) 00:54:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000013000)) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000000)={0x1}) clone(0x0, &(0x7f0000000140), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) dup3(r1, r0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:18 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000480)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/189, 0xbd) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x90000, 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000080)) 00:54:18 executing program 6: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffd, 0x0) ioctl$int_out(r0, 0x4144, &(0x7f0000000040)) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)) 00:54:18 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x10, 0x2000) r2 = getpid() ioctl(r0, 0xb6c4, &(0x7f0000000400)="04c6d7341d9d20fa5e704299eb5d0da8d73fd8f311678171fde1ba75061b22ee7ee4e84513b08bdfd3c147544f6ac534") ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000002c0)={{0x6, 0x3, 0x80000000, 0xe6, '\x00', 0x3ff}, 0x3, 0x4, 0xd2, r2, 0x7, 0xe04f, 'syz1\x00', &(0x7f0000000240)=['cgroup\x00', '/dev/usbmon#\x00', '%vboxnet0!\x00', '9vboxnet1\x00', '/dev/usbmon#\x00', "2d7472757374656465746830e42f6d643573756d707070316e6f6465766b657972696e67736563757269747900", '\x00'], 0x64, [], [0xfffffffffffff000, 0x2, 0x1, 0x2]}) r3 = dup3(0xffffffffffffffff, r0, 0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000100)=""/178, &(0x7f00000001c0)=0xb2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}, 0x8) r4 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x80000000, 0x0) ioctl$VHOST_SET_VRING_BASE(r4, 0x4008af12, &(0x7f0000000080)={0x1, 0x7}) 00:54:19 executing program 4: perf_event_open(&(0x7f0000ff3f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) socket$bt_hidp(0x1f, 0x3, 0x6) 00:54:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="b9c70b0000b802000000ba000000000f300f21bcc42175d08cf6d66a0000c4624d93443a00b9980100000f3265f2410f0866470fe07d001d0000000043d9fe66baf80cb85cc87b8fef66bafc0ced", 0x4e}], 0x1, 0x0, &(0x7f00000002c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'bond0\x00'}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x40000, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x500, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000280)={r4}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x140}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="1b1f000565dbc685bafa481534f2bc7ac0779a85bdb37dcc3ddceadd370d2806f47eded8a932", @ANYRES16=r5, @ANYBLOB="050127bd7000fedbdf251000000008000400030000000c0002000800090003000000480002000800050002000000080004000500000008000600000000000800080007000000080006000004000008000800dc00000014000100e00000010000000000000000000000001c000200080004000000000008000700ffff000008000b000a0000006400010008000800010000000c0007000200000005000000080002002c00000008000b0073697000080004004e22000014000300ff020000000000000000000000000001080004004e240000080001000a000000080004004e230000080009002a0000000800040001000080"], 0xf8}, 0x1, 0x0, 0x0, 0x11}, 0x840) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000003c0)={0x9, 0x10000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:54:19 executing program 7: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000040)="0700e1311f16f477671070") r3 = syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x200) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000000580)={&(0x7f000000b000/0x3000)=nil, 0x3000}) r4 = gettid() prlimit64(r4, 0xb, 0x0, &(0x7f0000000500)) madvise(&(0x7f0000002000/0xf000)=nil, 0xf000, 0x200000040000000f) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x14, 0x0, &(0x7f0000000080)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000000140)}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x80, 0x0) ioctl$SG_GET_REQUEST_TABLE(r5, 0x2286, &(0x7f0000000380)) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)=0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in=@broadcast=0xffffffff, @in=@loopback=0x7f000001, 0x4e20, 0x100, 0x4e22, 0x100000001, 0xa, 0x20, 0x20, 0x29, r6, r7}, {0x80000001, 0xc5c0, 0x3a, 0x1e, 0x3c7f, 0x5, 0x200, 0x6}, {0x3, 0x6, 0x401, 0x6}, 0x4, 0x0, 0x2, 0x0, 0x2, 0x2}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d6, 0x33}, 0xa, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x3504, 0x3, 0x3, 0x4, 0x5, 0x3ee6, 0x6}}, 0xe8) timer_create(0x7, &(0x7f0000000000)={0x0, 0x11, 0x1, @thr={&(0x7f0000000140)="1f28381631b6214a2e6dccdf9f8f912d9e592491959f1310720a3ae03ef11c4342b06b9e25f580e03f8e69a3c8fc55d84ae9fec4712ecb8865b3f11509a7f7e2fe0a60e8f11f16a64d493adf5ac915b0f571435054c7049c780f221ce370af8244dc30c25d1dd783f9c6c379b1485e89243180162bf897b6926d61be1c143e89ffa079a8e311c81610d91f44db3090dba2911a94d560ac09dcdb6b90dc37937190ca241bad7dcb28037ec7f76e4e8790be6cafeab245740b4601dcd10b154d246f10dd786968233e98a1d8d1f8129d13955a4e919cbb44953eff76e235090d97d22a9fcfe9894ca87f07b5ff13521e5369e4", &(0x7f0000000240)="43df0b2024c3b58798e4359d265ca89d2ad8f15df8603009a9f3552f53267a85b48c1a4b143960953c1cc4b1e4be5165937b3cbb31488ecc60fb47dd8c7536cf513cebb91ef1e3a2aad48f99d59c6485b3dc5bfd90bc3a38fd3d00cb78b11995a0d58d123685cda12ad4c9ae9dd5b25ee97cf53a38f21f3c12a4293fbde98a490297348eb0f9dcfd96774ca434e6e2ae546d2710b52c1bb44c8b846d5f40bf1baab28d5a9395d4b9a473a576529bb13a262264dc61f9924cc7fdd2b1de"}}, &(0x7f0000000300)) 00:54:19 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x4, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x200000d8) 00:54:19 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="c13790e0b635ac896e6365adb253ff57a99a25e6c2162d0f9c35b46ab49dfd4b00fc50b084121b8e69b5f0c8908a8a4d7cae6dded9e7eb9b59b1d7ac7150cba95833ef515a298bf0e4a46b7c92867c397f4f62105c4ef0591e2193124011c5c6dc5f6ec265d2a90d192ff0ee93121c3e7002e79882a6cc2838f9340e2bc629af29e3729474fb0ce26b0cb6f6a84931875de9c7cb3e029981b4119ed5db62ee3e0dc135980ebfab1b04f0350c5620cfcf54ee1a93e7590b9c42267aa95a7000acb7e6d15734fe41c3268a16c3500f24f99945cab68a0abd16587d0f831eaa67c32e6761f4ed5ffc27459ce52c55af6858f8e99fa157db2eb0e05e78401a2289c1") getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x1) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), 0x2) 00:54:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8100, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) r3 = fcntl$getown(r0, 0x9) ptrace$getenv(0x4201, r3, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r2, 0x2, 0xff, 0x2}, 0x10) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x5ff1, 0xffffffffffffff43}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}) r4 = syz_open_pts(r1, 0x20201) write(r4, &(0x7f0000000140), 0x28d) [ 143.496354] binder_alloc: 9280: binder_alloc_buf failed to map page at 20001000 in userspace 00:54:19 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x126bdf9c, 0x400) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0x81) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @rand_addr}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x21}, 0x68, r2}) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000340)=0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000080)={{0x1}}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r4}, &(0x7f0000000300)=0x8) 00:54:19 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r1 = dup2(r0, r0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000100)="66baf80cb89e26b88eef66bafc0cb06aeec481c562e22e64440f01ba91bf0000b9230a00000f32366726650f0090030000006767f3470fae653eb9020400000f32660f3a41fd0048b804000000000000000f23c00f21f835010005000f23f8c744240047000000c744240200300000ff2c24", 0x72}], 0x1, 0x0, &(0x7f0000000180), 0x0) [ 143.541717] binder: 9280:9284 transaction failed 29201/-12, size 0-0 line 2967 00:54:19 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) socketpair(0xa, 0x2, 0x101, &(0x7f0000000000)={0xffffffffffffffff}) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) 00:54:19 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x2ba282, 0x0) ioctl$KDENABIO(r0, 0x4b36) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000000c0)={{0x7e, 0x94ea}, {0x7, 0x6}, 0x8, 0x2, 0x2}) setsockopt$inet6_int(r2, 0x29, 0x19, &(0x7f0000000040)=0x4000040, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x1c) sendmsg(r2, &(0x7f000001b000)={0x0, 0xfffffff5, &(0x7f0000019fa0), 0x1f2, &(0x7f000001ef08)}, 0x0) close(r2) [ 143.612595] binder_alloc: binder_alloc_mmap_handler: 9280 20001000-20004000 already mapped failed -16 [ 143.678193] binder: BINDER_SET_CONTEXT_MGR already set [ 143.688140] binder: 9280:9284 ioctl 40046207 0 returned -16 [ 143.717279] binder_alloc: 9280: binder_alloc_buf, no vma 00:54:19 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x126bdf9c, 0x400) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000140)=0x81) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @rand_addr}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x21}, 0x68, r2}) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000340)=0x3) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000080)={{0x1}}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)={r4}, &(0x7f0000000300)=0x8) 00:54:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/134, 0x86}, {&(0x7f0000000140)=""/207, 0xcf}, {&(0x7f00000002c0)=""/177, 0xb1}, {&(0x7f0000000380)=""/147, 0x93}], 0x4, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x2289, &(0x7f0000000000)) close(r0) [ 143.722915] binder: 9280:9300 transaction failed 29189/-3, size 0-0 line 2967 [ 143.795858] binder: undelivered TRANSACTION_ERROR: 29201 [ 143.809940] binder: undelivered TRANSACTION_ERROR: 29189 00:54:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x408040) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x49, "338ca1114c40c52be63b8d3aa41920b8113bc526d95224308f59a0f7927da9876c117f16ee3a92e257206b07886ffef7a0cbe891416f52c309cbbc8e8246b2f20b9f4377a9e68bf723"}, &(0x7f0000000100)=0x51) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={r1, 0xc2, "ddc32124b0261f647eecab6183b4e731e4719784348ba2a39d8ab8366bc11a826d06fbdb68e0621d0480d8b2125392e43d20f1bea6a458d0f341ef82737c8f208d6a97b1e26b989d29d9bea42f92a1a7be28e033771e45b6ca59f7be3f545561a0be45775c9155941ff06e220276b11b6ba50501792e04c8cc5acfb5bf0e26101650f76e7cf5b6d184b7be7864df0fbe03722014cd5e4d53c3ce3fb07e82dfa708f220be90f29e3fadd69a17b41326af940bbc75b04f6dd9a287e1fdaa6f0814fc32"}, &(0x7f0000000140)=0xca) 00:54:19 executing program 2: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r1, 0x50, &(0x7f0000000140)}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000d36ff4)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000001aff4)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000019000)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) recvfrom$unix(r1, &(0x7f0000000000)=""/187, 0xbb, 0x40, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 00:54:19 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = geteuid() fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x3001, r2, r3, 0x3ff, 0x0) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup(r0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="080000b5f6000000309f8c19c2dcaa533bde4017a097404c3ba1de84731befec9d9b10c766e09c5ef068f71c6538fae3ea2c0be4ee0921edf9b27192563cf22f1845fbcf38f91a081225af44ea87b7307bc5fd2ed7c78a147ffb57b1425448233ce981dc5860bc60578720eb0d4254456c4129aba78f7c6c06d4ae75b5a995811a4383a0d5298f7d568d6813330ba14a68bd8fa9c02b56545ad1c39e135577bb4959ad3bac5e"], &(0x7f00000003c0), 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") openat$rfkill(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/rfkill\x00', 0x442080, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000100)) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000002200), &(0x7f0000002240)=0x8) msgctl$IPC_STAT(0x0, 0xd, &(0x7f0000003c00)=""/4096) sendmsg$rds(r1, &(0x7f0000002180)={&(0x7f0000000280)={0x2, 0x4e20, @rand_addr=0x80}, 0x10, &(0x7f0000002100)=[{&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/216, 0xd8}, {&(0x7f00000002c0)=""/51, 0x33}, {&(0x7f0000000340)=""/85, 0x55}, {&(0x7f0000001fc0)=""/244, 0xf4}, {&(0x7f0000000500)=""/121, 0x79}, {&(0x7f00000020c0)=""/39, 0x27}], 0x7, 0x0, 0x0, 0x40000}, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x2000, 0x1}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={r2, 0x5f1}, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000f40)=@nat={'nat\x00', 0x19, 0x4, 0x958, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000a88], 0x0, &(0x7f0000000580), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'ip6tnl0\x00', 'rose0\x00', 'vcan0\x00', 'ip6gretap0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], @random="8b82605c9879", [], 0x308, 0x308, 0x340, [@bpf0={'bpf\x00', 0x210, {{0x16, [{0x7f}, {}, {}, {0x0, 0x8, 0xe063, 0x7}, {0x401}, {}, {0x0, 0x0, 0x0, 0x1ff}, {0x1, 0x5, 0x4}, {}, {}, {0x0, 0x6, 0x5, 0x4}, {}, {}, {0x0, 0x0, 0x5, 0x34}, {0x10001}, {}, {}, {0x400, 0x6, 0x100000001, 0x53}, {}, {}, {0x0, 0x0, 0x0, 0x7fffffff}, {0x0, 0x7, 0xad6, 0x1}, {}, {}, {0x0, 0x0, 0x0, 0xffff}, {0x6, 0x100000000, 0x0, 0x1}, {}, {}, {}, {0x2, 0x10000, 0x2}, {}, {}, {0x0, 0x3ef, 0x1, 0x6}, {}, {}, {0x0, 0x0, 0x2, 0x6}, {0x7, 0x1000}, {}, {}, {0x0, 0x4, 0x7, 0x5}, {0x800}, {}, {}, {0xfff, 0x4, 0x2d, 0x4}, {}, {}, {0x0, 0x0, 0x7, 0x7fffffff}, {0x3bd474c0, 0x3f}, {}, {}, {0x8, 0x1, 0x6}, {}, {}, {0x0, 0x80, 0x91ca, 0x8001}, {0x1000}, {}, {0x0, 0x0, 0x0, 0x33259fb0}, {0xfffffffffffffff9, 0x5, 0x101}, {}, {}, {0x0, 0x3f, 0xfffffffffffeffff, 0x494}, {0x8}, {}, {0x0, 0x0, 0x0, 0x1}], 0x8}}}, @arp={'arp\x00', 0x38, {{0x31f, 0x0, 0x0, @empty, 0x0, @dev={0xac, 0x14, 0x14}, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @link_local={0x1, 0x80, 0xc2}, [0xff, 0xff, 0xff, 0xff]}}}]}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}}, {{{0xf, 0x0, 0x0, 'eql\x00', 'eql\x00', 'ip6gretap0\x00', 'syzkaller0\x00', @random="148a880ff992", [], @empty, [], 0xb8, 0xf0, 0x128, [@limit={'limit\x00', 0x20, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}]}, [@snat={'snat\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}]}, @snat={'snat\x00', 0x10, {{@random="d6094285be65"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'erspan0\x00', 'rose0\x00', 'bpq0\x00', 'bond_slave_1\x00', @random="9f28436b36e3", [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x2a8, 0x2e0, 0x318, [@bpf0={'bpf\x00', 0x210, {{0x0, [{}, {0x0, 0x7, 0x80}, {}, {}, {0x0, 0x9304, 0xff, 0x8}, {}, {}, {0x0, 0x0, 0x0, 0x46cd}, {0x100}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x800, 0x385}, {}, {}, {}, {0x1, 0x401, 0x10000000000000}, {}, {}, {0x8, 0x56}, {}, {}, {0x2, 0x0, 0xc0000000000, 0x3}, {0x7}, {}, {}, {0x1, 0x401, 0x6}, {}, {}, {0x0, 0x0, 0x100000000, 0x8c60}, {0x439}, {0x0, 0x0, 0x0, 0x20}, {0x9, 0x6, 0x7, 0x5}, {}, {0x0, 0x6, 0x1, 0x2}, {0x81, 0x2c98}, {}, {}, {0x401, 0x80000000, 0x20}, {}, {0xffffffff80000000, 0xf800000000000000, 0x0, 0x6}, {0x9, 0xffff}, {0x0, 0x0, 0x0, 0x8}, {0x7e5, 0xfffffffffffffffd, 0x5}, {}, {0x0, 0x0, 0x401, 0x70}, {0xffff, 0x0, 0x100000000, 0x1}, {}, {0x0, 0x1, 0x5, 0x98b2c90}, {0x3, 0x3}, {0x0, 0x0, 0x0, 0x7}, {0x2, 0x1, 0x2, 0x667}, {}, {0x2, 0x3, 0x1}, {0x9, 0x0, 0xfffffffffffffff8}, {}, {0x0, 0x0, 0x0, 0xc28}, {0x7, 0x6, 0x6, 0x7ff}, {0x2}, {0x0, 0x0, 0x1f, 0xffffffff}, {0x5, 0xa4d2, 0x40}, {}, {0x6, 0xfffffffffffffffc, 0x7, 0xc85}], 0x3}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2}}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}, {{{0x9, 0x40, 0xf7, 'bond0\x00', 'ipddp0\x00', 'bond0\x00', 'syzkaller0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x12}, [0x0, 0x0, 0xff], 0x70, 0xe0, 0x118}, [@arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}, @snat={'snat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe}]}, 0x9d0) ioctl(r0, 0x100000, &(0x7f0000000200)="3a43413552fd2a60c56d58bbc8fba7f3540e58d51421dd91b21bd0c6234c146d502de6a816fb37acf5d000") fsetxattr(r1, &(0x7f0000002280)=@known='system.sockprotoname\x00', &(0x7f00000022c0)='arp\x00', 0x4, 0x2) 00:54:19 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getrlimit(0xb, &(0x7f0000000100)) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x400000000000003f) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1c3, 0x2000000005d, &(0x7f0000000580), 0x0) r4 = shmget(0x1, 0x1000, 0x10, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000040)=0xe8) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r2, 0x10, &(0x7f0000000600)={0x0, 0x0}) r10 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000640)={{0x5, r5, r6, r7, r8, 0x10, 0xba0}, 0x8000, 0x6e48, 0xfffffffffffffffd, 0x1, r9, r10, 0x401}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000080)="3e0f019808000000f36d6464f20f2d3e0f2250b925020000b800000000ba000000800f308fe9100152f7c4c17a2ca29f454ec13e3edfcd0f607e000f01df"}], 0x3b1, 0x0, &(0x7f00000000c0)=[@cr0={0x0, 0x1}], 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 00:54:19 executing program 4: r0 = socket$inet6(0xa, 0x805, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x3, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x4}, 0x1c) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x200, 0x0) 00:54:19 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x80000001, 0x200000) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f00000000c0)=[{r1, 0xfffffffffffffffd}], 0x1, 0x7be2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000180)) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x27b, 0xffffffff, &(0x7f0000e1d000), 0x8) r3 = fcntl$getown(r1, 0x9) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x2, [0xfd5, 0x8]}, 0x8) tgkill(r3, r4, 0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000140)={0x80000005}) 00:54:19 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa0c, {&(0x7f0000000280)}}, 0x200000d8) [ 144.052039] xt_bpf: check failed: parse error 00:54:19 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYPTR], 0x0) 00:54:19 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, r2, 0x2, 0x70bd28, 0x25dfdbfc, {0x10}, [@IPVS_CMD_ATTR_DAEMON={0x4, 0x3}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000180)=r4) getpeername(r3, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) [ 144.107920] xt_bpf: check failed: parse error 00:54:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) socket$vsock_dgram(0x28, 0x2, 0x0) 00:54:19 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000200), 0x0, 0xfffffffffffffffe) ioctl(r0, 0x200004000008912, &(0x7f00000000c0)="295ee1311f16f477671070") r1 = add_key$keyring(&(0x7f0000001400)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="6b6926ffca0a4990b00c72b9435c38affc302150dba0b8e7", 0x18, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10000, 0x0) mq_timedreceive(r2, &(0x7f0000000240)=""/36, 0x24, 0x5, 0x0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f0000001180)={0x73, 0x79, 0x7a}, &(0x7f00000003c0)='selinux!)#{cpusetproc\x00', 0x0) 00:54:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000001880)=@buf={0x32, &(0x7f0000001840)="58e29008f295b88748545f9384bf4c3aff2e546055217f44f69f174f24a755d681e7f451dbdb7d5f7e446026ff99a03ae0d9"}) r1 = socket$inet6(0xa, 0x1, 0x0) io_setup(0x3f, &(0x7f0000000040)=0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) r5 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x6, 0x80040) socketpair(0x15, 0x800, 0x100, &(0x7f0000001600)={0xffffffffffffffff}) r7 = creat(&(0x7f0000001780)='./file0\x00', 0x10) io_submit(r2, 0x5, &(0x7f0000001800)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xf, 0x5f, r0, &(0x7f0000000340)="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", 0x1000, 0x5, 0x0, 0x0, r3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, r1, &(0x7f0000001340)="ba59f8a39603cf52494cc6138a193826d65c28ccc5a8356568781628e740316af43797e7f8b3a0fb6fb7737f1ba6cf837a4696b25e466b4f1039294d27c3c2c60d27c678d36a74ca905878b24b76fd35cc14b4904fb6671b0c55648803c423157d02487f42c4aed46380f4349c583fd1962789300135958c1fd858d5444ac3f26b0060578a88bac33a54b940356d0dfab476c91cf51ffa0acb9d1ddfdad39351f5e2dadd9e1da8b563084f7ce881bc23f486d28c28d466aa179cdbd888181e466fd249ac", 0xc4, 0x81, 0x0, 0x0, r4}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x800000, r0, &(0x7f0000001440)="5b4aeb2adc4c347a76d99e608dabad103436fb88fe779dba40e11fd6ec02cd9c1470201693fb24fbdaad3af60faaab84cbe31b2619082f361c06ae2c4f7ed014517beed4fe37ecc2857a809ce9a996cb5513a5bb3dc3374133b400ed8b2cd532e312ed9fdfaca9ff6e9b7fe8dda94382e3c6d2c519ef1e164c4434528c20083498a15e15c597b0ccf7b3ef681a460c2235f1d7f5ffbce00d3e15e36bdb62bae77397934ebafccfdf9cb3ef42da150d95cf9f9ab1e65c89c32e15c17a", 0xbc, 0x401, 0x0, 0x1, r5}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000001500)="ee5ee177d982d6365409929dbb6bc48bfb05fd775b1e9052cab7b50da1822c3c5b4410cedccb4fcbc0e2ba7d2fe96ce104c041bef65843b7b621d16c71a35b0cc8062704ac593796b086a8109dbc51973438a3dcc745dd6e33607226cf9e3f41f885887d5220dc0b7ad8c2bf990e754adad6f46a2f19367c4eccb146d8eda54b4acddbaa47c136c6759f1d89713c5492dc9702dfba0621523c43a336a1e618e795250e65b531a1667c5a29e849d5f941d6c47e3eadd9b337e5595c52ddf31be892d265b72f6028e4", 0xc8, 0x8c88, 0x0, 0x1, r6}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x2, 0x7fff, r1, &(0x7f0000001680)="7016291a1adc63ae63ebd9d2cd58af6073d78708e06080999b485e7a7db9d0afc621fa467492fd13f54d46bf4051319c53fd5fc46c2cd6be774c36660faeebbba6235f12d79c580c888989ba234a0d7340c473da16583efecc3072721dc4df84e150b4f7f57a5949272f0c2d3d158307b1b08cadb1ca6340ba80a0ffad9d0d80ef5571b0071c7bf4586074b62328e5a5f2d5dddc785e560d23a1d44945796487a2559d61a1eb2586ac75a9709227db94b45b484bed4fbb6dc9340dae2e3e9cd2384f92cbd9f9fd9a50", 0xc9, 0x4, 0x0, 0x1, r7}]) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=@ipv6_newroute={0x2c, 0x18, 0xb03, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_METRICS={0x4, 0x8}]}, 0x2c}, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e20, @broadcast=0xffffffff}], 0x10) 00:54:20 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) socket$inet6_udp(0xa, 0x2, 0x0) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000080)=0x80) bind(r0, &(0x7f0000000140)=@nl=@unspec, 0x80) socketpair(0xb, 0x1, 0xfffffffffffffff8, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x2, 0x4) 00:54:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup2(r0, r0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) fstat(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@local={0xfe, 0x80, [], 0xaa}, @in6, 0x4e21, 0x2, 0x4e24, 0x0, 0xa, 0x80, 0x20, 0x16, r3, r4}, {0x20, 0xdec, 0x3fdf, 0x3, 0x6, 0x4545, 0x10000}, {0xa3, 0x1, 0x20, 0x400}, 0x3, 0x6e6bc0, 0x1, 0x0, 0x3, 0x2}, {{@in=@broadcast=0xffffffff, 0x4d5, 0x3c}, 0x2, @in=@broadcast=0xffffffff, 0x3506, 0x7, 0x0, 0x8, 0x2b24, 0x400, 0xd84c}}, 0xe8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:54:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xc56, 0x24800) ioctl$TIOCCBRK(r2, 0x5428) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0xc900000000000000) sysfs$2(0x2, 0xffffffffffff0001, &(0x7f0000000040)=""/159) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x11da42c, 0x200000) 00:54:20 executing program 7: r0 = socket(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/fscreate\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000440)={0xf, 0x8, 0xfa00, {r2, 0x11}}, 0x10) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xc0000, 0x5) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000380)={0xa8, 0x0, &(0x7f0000000240)=[@reply_sg={0x40486312, {{0x4, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x28, &(0x7f0000000100), &(0x7f0000000140)=[0x48, 0x28, 0x30, 0x38, 0x68]}}}, @transaction_sg={0x40486311, {{0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x18, 0x18, &(0x7f0000000180)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x4}], &(0x7f0000000200)=[0x30, 0x0, 0x30]}, 0x5}}, @clear_death={0x400c630f, 0x2, 0x4}], 0x57, 0x0, &(0x7f0000000300)="0251a66588c795f3c0fae00fdb4d081977894d753c205cac0ef3e27d03bcb0dfc9ed2afdd3bab5fb7d89248eddd8a268cfd78ee30e370efa8f2f43b7c904a955a87b025d2af850047bfbb33db834e63889808cc7e14a0e"}) unshare(0x40000000) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000056c0)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_IFNAME={0x14, 0x3, '\neth1\x00'}]}, 0x34}, 0x1}, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r4, 0xc008ae67, &(0x7f0000000480)={0x401, 0xfffffffffffffffe}) 00:54:20 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r0, 0x40) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) [ 144.330329] IPv6: NLM_F_REPLACE set, but no existing node found! 00:54:20 executing program 2: fchdir(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000040)=""/47, &(0x7f00000000c0)=0x2f) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x24080, 0x0) accept(r0, &(0x7f0000000100)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, &(0x7f0000000180)=0x80) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) 00:54:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x6, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x4000000, 0x1, &(0x7f00000003c0), &(0x7f0000000080)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)=0x0) migrate_pages(r2, 0x0, &(0x7f0000000240)=0xffffffffffffffe1, &(0x7f0000000280)=0xb9e) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40010054}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="507028d574930156001f6b648bf616e084cf30602fc5fe754f013ebdfcdd3fcb4d8377d81b62641f7149dbccd9d005a547f9e36af9c7392168a93b26590744ea388305fc8eeef6c6ce14217bfbc0805f2670ddf26a015da4f2ac83fcf9d0b12a8c6bc6b866f48bc9f811d1608b42c8656fe07296c446f92c7c97", @ANYRES16=r1, @ANYBLOB="000228bd7000fbdbdf2511000000380003000800010003000000080003000200000008000100020000001400020069706464703000000000000000000000080004008d06000024000200080006000600000008000400df000000080004000200000008000500ffffffff2800030000000000000000001400020065716c0000000000000000000000000008000500ac1414aa"], 0x98}, 0x1, 0x0, 0x0, 0x4001}, 0x8000) [ 144.399962] IPv6: NLM_F_REPLACE set, but no existing node found! [ 144.428215] IPVS: ftp: loaded support on port[0] = 21 00:54:20 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa02, {&(0x7f0000000280)}}, 0x200000d8) 00:54:20 executing program 0: r0 = socket$inet6(0xa, 0x80000, 0xe) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ftruncate(r1, 0x10001) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0x4, 0x0, 0x0, "76d9ef13"}) [ 144.648870] IPVS: ftp: loaded support on port[0] = 21 [ 144.821340] attempt to access beyond end of device [ 144.826662] loop0: rw=1, want=386, limit=112 00:54:20 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x80000001, 0x200000) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f00000000c0)=[{r1, 0xfffffffffffffffd}], 0x1, 0x7be2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000180)) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x27b, 0xffffffff, &(0x7f0000e1d000), 0x8) r3 = fcntl$getown(r1, 0x9) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x2, [0xfd5, 0x8]}, 0x8) tgkill(r3, r4, 0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000140)={0x80000005}) 00:54:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x1, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r1, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x10000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000040)) 00:54:20 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xb3710ac58ad8cc62, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000080)={0xffffffffffffd96c, 0xc, [0x3, 0xffffffffffffffc1, 0x2]}) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x1ff, @dev={0xac, 0x14, 0x14, 0xe}}, 0x1, 0x2, 0x3, 0x3}}, 0x2e) 00:54:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x93}, 0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x74, r3, 0x20, 0x70bd2b, 0x25dfdbfc, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4a}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe03}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0xd5}, 0x20000040) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x26, "acc827c8ceb307c9a2fb6546ab12835bb74b27a44f560544e10698a48a516e9733d918b0f570"}, &(0x7f0000000100)=0x2e) 00:54:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) keyctl$session_to_parent(0x12) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="ad56b6c504", 0x5) sendmmsg(r1, &(0x7f000000c8c0)=[{{&(0x7f0000006b00)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000009d00), 0x0, &(0x7f0000009d80)}}, {{&(0x7f000000b1c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f000000c840)}}], 0x2, 0x0) 00:54:20 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, &(0x7f0000000180)) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x6c8100) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r1, 0x0, 0x1) 00:54:20 executing program 0: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x80, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000280)={0x20000000000000, 0x4, 0x1, 0x1, 0x20, 0x6, 0x1eaa0000000000, 0xf58, 0x1000, 0x3, 0x8000, 0x6}) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000140)={0x7ff, 0x9, 0x79, 0x8}) epoll_wait(r2, &(0x7f0000000000)=[{}], 0x1, 0xffffffffffffffc0) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, &(0x7f0000037000)) epoll_wait(r0, &(0x7f0000000180)=[{}], 0x1, 0xffffffff80000001) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)={0x7}) r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x5a, 0xe75, 0x0, 0x7, 0x0, 0x2, 0x0, 0xe, 0x0, 0xfffffffffffff2c3, 0x80000001, 0x0, 0x3ff, 0x80000000, 0x4, 0x462a2837, 0x800, 0x4, 0x1, 0xa386, 0x2e, 0x4, 0x692, 0x10000, 0x2, 0x90e2, 0xbb, 0x100, 0x0, 0xffffffffffffffff, 0x3, 0xb9, 0x80, 0x401, 0x0, 0x1, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x8}, 0x10, 0x800, 0xa98, 0x7, 0x64, 0x8aa, 0x5b}, r4, 0x8, r3, 0x2) 00:54:20 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xffff0000}}, 0x200000d8) 00:54:20 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0xd33f, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x3, 0x200) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) getpeername(r1, &(0x7f0000000040)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f00000000c0)=0x80) 00:54:20 executing program 7: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = msgget$private(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x2001, 0x0) exit(0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x800, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) msgrcv(r1, &(0x7f0000000040)={0x0, ""/55}, 0x3f, 0x0, 0x0) msgsnd(r1, &(0x7f00000000c0)={0x1}, 0x8, 0x0) 00:54:20 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = userfaultfd(0x80801) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) r2 = dup(r0) accept4(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f0000000180)=0x80, 0x0) getsockopt$inet6_int(r2, 0x29, 0xff, &(0x7f0000000080), &(0x7f00000000c0)=0x4) dup3(r0, r0, 0x80000) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000080)) read(r1, &(0x7f0000009f9c)=""/100, 0x64) 00:54:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = semget(0x0, 0x4, 0x4) semtimedop(r0, &(0x7f0000000040)=[{0x4, 0x5, 0x1800}, {0x5, 0x9, 0x1000}], 0x2, &(0x7f0000000080)={0x77359400}) 00:54:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x460000, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000100)) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r1, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xffffffffffffff80}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={r4, 0xce}, &(0x7f0000000200)=0x8) ioctl$TIOCGSOFTCAR(r3, 0x5437, &(0x7f0000981ffe)) ioctl$TCSETS(r2, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$TCSETSF(r1, 0x5441, &(0x7f0000000000)) dup3(r1, r3, 0x0) 00:54:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0xc0a, 0x8) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, &(0x7f0000000400)) 00:54:21 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) write$binfmt_elf32(r1, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x400, 0xcdc, 0x2, 0x7, 0x4bef77f2fda7f576, 0x6, 0xe681, 0x23, 0x38, 0x1ad, 0x1, 0x7, 0x20, 0x2, 0x1, 0x4, 0x2}, [{0x70000000, 0x8000, 0x125, 0xea7, 0x0, 0x9, 0x4, 0xcbd4}], "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", [[]]}, 0x1158) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:21 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x2000}}, 0x200000d8) 00:54:21 executing program 6: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) restart_syscall() 00:54:21 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7f, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000080)=""/203) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000200)={0x208, @time={0x77359400}, 0xe2f, {0x39d, 0x3}, 0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=0x0, &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0x3, 0x7fff, 0x208, 0x1, 0x8, 0xc9f5, 0x0, 0x4, r3}, &(0x7f0000000480)=0x20) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000280)={0x6, 0x8, 0xa99, 0x0, 0x0, 0xfffffffffffffffc, 0x9, 0x3, 0x3, 0x1, 0x2, 0x3, 0x0, 0x81, 0x8, 0x6, 0x7, 0x3, 0x80000000}) 00:54:21 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair(0x1a, 0x80000, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0x3, 0x4) ioctl$BLKPG(r0, 0x90000915, &(0x7f0000000040)={0x0, 0x7, 0xd7}) 00:54:21 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000200)) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x80000) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000000c0)=0x2) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af14, &(0x7f0000000100)) 00:54:21 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x3f00}}, 0x200000d8) 00:54:21 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r1, 0x0, 0x70bd2a, 0x25dfdbff, {0x2}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xbb}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x800) r2 = socket$inet(0x2, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r3, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:21 executing program 0: r0 = socket$inet6(0xa, 0x200000000000f, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000240)="2e2f636f6e74726f6cff05", 0x0, 0x0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)=0x7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlinkat(r1, &(0x7f0000000280)='./file0\x00', 0x200) 00:54:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x200}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="0afdffffff005104fd26d8ec95c2648476a94f1fa4a1df707958263ffe27cc021d4a413624791601d57e011046ee2dc2f54dc348e4653c905e020a6ce3643cf864b4f0aa39adb6cba622630e9efb902dc834"], &(0x7f00000000c0)=0x12) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = inotify_init1(0x7) fcntl$getownex(r2, 0x11, &(0x7f000045fff8)) 00:54:21 executing program 2: r0 = syz_fuseblk_mount(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xffff, 0x84200) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000005c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@rand_addr, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) r5 = getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000d00)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) r8 = getegid() sendmmsg$unix(r2, &(0x7f0000000f40)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000180)="2f1e573a1e9da25082e639119f0f8387a42cc670a9b932a826381e54546352ffa5a94110652942546732046694d035ff32e8fa35081e404765fca4b06c92d27a73c640d164853f7a40d6048f179718b82ca904b705e7ee7195d79a3e89efab4bfb4474db06", 0x65}, {&(0x7f0000000200)="0a52496dec62a7a17cd537f9ba4dc883", 0x10}, {&(0x7f0000000240)="f9bdb84c7f52d335f448addeca2ddc0c8377dcbc9600d418cf8d43e699db407395a00158eee765fd0d86e1135f7ee0a9d8481b7c7b7b1173602080ba1638a1d5f3f76f885cf96407350053fb11a2cb9d86a9ea0a9b081397", 0x58}, {&(0x7f00000002c0)="09a8d0866afd03814ef75b2eaa0f73", 0xf}, {&(0x7f0000000300)="66f76b146f58d4ed90774e2c09ba03722c4e720f7195ec9a23692f002b3ea6387013c779dfc59e13d6876f2e2b8631667b324b3595ada2a3270846d1256109be6484426a4c99c2a4b9921f294619a715f9ab4193b843b74528001ff9a5ebf2591f9aa28dd4b7330011a82a286aafcfbef7a2b3e94aece03c03ded6774f8272042781c3f6", 0x84}, {&(0x7f00000003c0)="bc9593274aebada9e1e7675860b61f2ba7eccfb13eb037917bfceae54165b62035b43ac153b94615662c9010e3298f91929be50250ac36980b8c7093b70604c4ce235a5051639b6b676bacf67bc368f429b3fde0cbe5956aff9efd42e7c8f023b5a95348f74cd33b699ed704ca858b2100ae11f54bd8e05245babf4dc6cdca36a5a65c6152d8c3b4fee1923555e966e202220b0307d70199af9426c172cf7d06dfae763d11087ff63d619dcdefcd5829499c0cfb5e22eb382094966d9488df25326280ad53e2fc8f287718af9a7ceeecb50b709399978327ce5a79632c260068b6c2fbff5e31f93b4ef67aaed0", 0xed}], 0x6, &(0x7f0000000740)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x20, 0x1, 0x1, [r1, r0, r0]}, @rights={0x18, 0x1, 0x1, [r1]}], 0x70, 0x805}, {&(0x7f00000007c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000840)="cbb1d08a24009421a933fdbb7c553b5010735f044cde9e035812059b4ca70f466dd9bd00cd0dd6e08b5b9f5ca01c8f244c6781d93fc2aedc0128a61b2c411ce8476905e0d60803febc4411ca63a86e962c539b8d39626b38fd9444c74fe64a9512411015ffc2aefd7f9d87147b38211a6aab5f6248c37475670b70a2193e7f4939723f988c5401145438140ef5b2fb41c9641dd7928c60732abeaf57625539148f6e84c309d4c2d94583bfc0a2518799fba9eb729dbbec02da2c2bff896fa074bf094228b013e216966026be39e078286420a7d088e37226258892588bdcaed357a000c47583", 0xe6}, {&(0x7f0000000940)="fba4180f6d093c04b3f2523d660ca069ba3ddcfe565d8a8ae61ebeb8015e955be24b7135a7764e45de6d65bad410e0d024870a750afec83f78923656c4399b3497805cf149f589f7adc63a7320f9b5c2b03d994f9332978c0f32a8e68f60f76216c37c5f6241a74879584d2f70689a9fe3bf94bd01fcb3fa06c00ba292fe318e924e", 0x82}, {&(0x7f0000000a00)="63ba4db54208bcd47df3eb62fb5f696caae537c018ac9327536b781ec9af03bd7654a71e213d3cc424ae54af254a83edef48f8b500162beba2c83106cf8c11871b17541aa6c4c46d2aecd7e5e5498a96c23b011cc0bc1cbbf0a39b9b79173d347e80ad01118cf91080da5d7f2291bf48aa72010cbfd2b42fafae16d5a7d2db74551b0526ec063a7db26138fdf38f3db09395d7977d161e793dcfc26365b99c0df792ab810595ef", 0xa7}, {&(0x7f0000000ac0)="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", 0xfc}, {&(0x7f0000000bc0)="bc3429d29c8f90b8267d98066a8b47bd9f20df1ab3d0383293abf591c45d4749e87ffd7e33e9af047761c8f34884ff9731a377257750468c1556c23c63c25b94da0ffdad442f5cb34468724fe03965f260addd4514e51a59a7b92e2d07e06004b78110d5afcbdd578410dc7cc556a4bd89911c65990afd893329d86aae81c9732983971785b457ea4f", 0x89}], 0x5, &(0x7f0000000e80)=[@rights={0x18, 0x1, 0x1, [r1]}, @rights={0x28, 0x1, 0x1, [r1, r0, r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x10, 0x1, 0x1}, @rights={0x18, 0x1, 0x1, [r1, r0]}, @rights={0x30, 0x1, 0x1, [r0, r1, r1, r0, r1, r0, r0, r1]}], 0xb8, 0x1}], 0x2, 0x20000000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) 00:54:22 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x84000, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) 00:54:22 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='GPLU%(\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:22 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000100)={@multicast1, @rand_addr, 0x0}, &(0x7f00000001c0)=0xc) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={r2, @local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 00:54:22 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x8, 0x2b7, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX]], &(0x7f0000003ff6)='syzkaller\x00', 0x11, 0xc3, &(0x7f0000009f3d)=""/195, 0x0, 0x1}, 0x48) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x8, &(0x7f00000015c0)=[{&(0x7f0000000180)="07c3200bc261f59a4775dd6d694c7378901e7dde85b41cf8e9553e228fbc824413077317e366631f7c641f86ebc527c0d07f089dd9e53d93bf0a0e7397a01f12ba7d27f48726352ce7fb8b4a4e213d7c499bf404bfc04340cc2684d203d9a7ffb15eeb1b31108600fd3874d1b056", 0x6e, 0x3}, {&(0x7f0000000200)="03144b359063d7930c23015d2bc585ad3d19a48aa29f678518b79650edc6cb16bcdaddb60c2fa22bc59058506588e8051a913f4aeee297cdd896ebbfea5ce864f9f488c217cdb1ea18c1b80bf70d2a679e0458f5af88f2461c98f328e50320a0ad749cd9e1a34111200dcbb5ca640aeea2b9654921e1b2", 0x77, 0x9}, {&(0x7f0000000280), 0x0, 0x80000000}, {&(0x7f00000002c0)="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", 0x1000, 0x20}, {&(0x7f00000012c0)="f5838f9c09cf47a258d2b00a2bb0e5acf04d395d0495f1c841556995893432c3144ee9fbaff82311ec91d49032436e8afdc4cab6a05fd0d80cd3f0ff051aab40f2e00db3e49a7d93cd52b2a491323160d458ce99b1e0585fc94713389ea0ade1e809382d350fb15bfa1b75316029dfdef8e15eed16757615b4e10197b637ff230375a1d5a88838df2c5ecb57baa6dc4ec9e68e9d34bd89f20f924616dac1254769dfd5b32dca1b2131c3a9ab92fb463e0c", 0xb1, 0xbd}, {&(0x7f0000001380)="29b608873bdddc91630fbb0eb3b2270a494d70c47128947540f3ea5c99e4a1ebe15233d3df881f683a0cf0d7e4a6869ef1ade4e97c106c0616a0ef81577e73c069549d5b5a43df6bd6fd9c31952c8d413fd4db3ffe3cceb51797ee112c65800d515602de45271f5c47f0c1f14abba524bc1bc4305455b5d7b66e655985f40a935c08037cbc4e", 0x86, 0x1}, {&(0x7f0000001440)="09559145113005d1d4f3f2e4ec5cfe41e8d687c87e4ca43180830750339c09c0ca273e5c5b328d025e789d57991fb4305b2da264295ff98189174caaebc2e9ffaec587210f799d166ee10a7db053a675c219c0116822eacf026e5bf6e3d6da5a237e0a854d7a2437fb44f227b2a46059c3accc5e2fa9d5c878fb8078a89f68c86bc9581d7746163c96f631c04383971669885ae456544adbd43a08f03569f81c673af6bba7dbda2eac443fadb589108f5eb5fdaa02c5203674bcd9f77c444182dace86b727da2768206cab0b6c791047c522", 0xd2, 0x6}, {&(0x7f0000001540)="1332a71b4765ebd06ad4ad49fbeec43bcfa0e7dd4e576016ef9675e403bbbb9b6d45fea14217f1e8c86073b120bd17bbc1ab1407b099f0293b0eb395ff75989383ca768181", 0x45, 0x9e}], 0x200000, &(0x7f0000001680)={[{@barrier_val={'barrier', 0x3d}, 0x2c}, {@max_batch_time={'max_batch_time', 0x3d, [0x78]}, 0x2c}, {@noauto_da_alloc='noauto_da_alloc', 0x2c}, {@user_xattr='user_xattr', 0x2c}]}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cuse\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001700)={0xffffffff}, 0x13f, 0x5}}, 0x20) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000001800)={0x1, 0x101, 0xfffffffffffffffb, 0x5006}, 0x10) open_by_handle_at(r1, &(0x7f0000001840)={0x73, 0x5832, "7f30e703a6111555b06e30626346fdfd0e1a2788c3f9ed2df3e47a96556ea7a8e70f32c184b40bc08f9b2fc2a3c4ee0821ea3e2e44bc76356691e7a537abda4c1541319948673c20dd05bd1972fea117eb044dca8656c84ff269dab496d0517f8e186f0757ab644efa8fd5"}, 0x301a01) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001780)='/dev/sequencer\x00', 0x100, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x5, 0x100) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f00000017c0)={0x12, 0x10, 0xfa00, {&(0x7f00000016c0), r2, r3}}, 0xfdbe) 00:54:22 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000240)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)="c1000f000000000067061fe4ac141414eb", 0x11}], 0x1}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x5, 0x40, 0x8000}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x1b, "0337f08f5d247a60cfc54bb4cdc437a62b9918f784573e7a7d5e3d"}, &(0x7f0000000140)=0x23) 00:54:22 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000040)="3ba1df76d013f463d3ab5825365bbe1c975a5c3f657433fbe4fba93498778c9403cae97793d8eb13891060158e2067bcfee9b9723d02ea95c01f717d96b8d5ce557dd8b071fce69960e5ce20088e9cf3b56014422e5fc14f404d7c47b621498ce6dfe74fe9e6abad3752683ee2da16a2098f7b000d504476c9b4ba1231c399241d460275a0313a2a88c8f87288b8de34c5f6f73a611df3b94ada9f58f14947b77c0e8f0385935d291232f7ceddb1ffd5bff84735838faa056bc3fbebeed89a") mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x100000001, 0x20000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) tgkill(r1, r2, 0x3f) 00:54:22 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) connect(r1, &(0x7f0000000000)=@ethernet={0x307, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x13}}, 0x80) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) [ 146.351242] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 00:54:22 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)="df640085c6eb69db218ba41f17cd5c839cdfc36f2f41b93a466e43d1b3918e4c30dcca461ac7781986fb7606fe01956b27d47ec3e630bdceb5701fdc2502a3e28a2222b7a4cc52e3da3e87be0616a2ffff322328152dcc465cf656ca07f64aa0c0128469fa64220f4fd599a27a820ad1daa596ead2302500142a555c4aebe76d211326eba6a5eb8b53474abb323eac5aa8270ac23b8ad950015e786c6a48fe3f7136e79b89f36064c31d8a7ebca4622479f706b941e4f01586057b1463c28d93220e483afc7d568efad9ae8971e047bd06e431ea461ade83a6ea5df3dd34b48494e4ba99d1d24fc1d3667abe40ff8ff09b964dff057b9166", 0xf8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000200)=0x4e7, 0x4) sendto$inet6(r1, &(0x7f00002a0b14)="f6", 0x1, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 00:54:22 executing program 1: socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:22 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8, 0x4, 0x4000000000004, 0x1ff, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001240)={r0, &(0x7f0000001100), &(0x7f0000001180)=""/153}, 0x18) r1 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r1, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") r2 = socket$inet6(0xa, 0x803, 0x3) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000e5bef8)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400002, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000140)={{0x21, @multicast2=0xe0000002, 0x4e22, 0x4, 'fo\x00', 0x1d, 0x7, 0x7}, {@rand_addr=0x9, 0x4e24, 0x3, 0x0, 0x2, 0x7ff}}, 0x44) syz_emit_ethernet(0x66, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd6006f52600303a00fe8000000000000000000000000000ffff02000000000000000000000000000180f5907800000000600a07ec00000000fe8000006c9435a1fcbbe00000000000000000000000ff00000000000000000002ffffac140000"], &(0x7f00000016c0)) 00:54:22 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1_to_bridge\x00', 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @rand_addr}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4, 0x0, 0x80}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 00:54:22 executing program 2: r0 = socket$inet6(0xa, 0x807, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000580)={0x10}, 0x196, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_ADDRESS={0xc, 0x4001, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}]}, 0x2c}, 0x1}, 0x0) [ 146.509345] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 00:54:22 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xc00000000000000}}, 0x200000d8) 00:54:22 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8001, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x14) r3 = dup2(r0, r0) bind$xdp(r1, &(0x7f0000000140)={0x2c, 0x1, r2, 0x38, r3}, 0x10) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r4, &(0x7f0000000080)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) getitimer(0x0, &(0x7f0000000040)) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x0, [], 0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e23, 0x6630, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, [0x20, 0x5, 0x6, 0xc611, 0x7ff, 0x2, 0x6, 0xffffffff, 0x81, 0x401, 0x8001, 0x391, 0x100000000, 0x6b, 0x800]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={r2, 0xb5, "5aa92cf455369464fdd36892b9e0bad395079478429a4b30a2187c9ba4937c91fc1a2b88fea8f7d4d55a0ca48596e6321ebe59e0c75c766dc5dd471b2b3d8c17caf560fe5f05ac00c6cd1cf9cdb8670737d1830ac0a35d66af1aa4605356678897bb7b66a774b722e0bf57d7764797ae6e80d24f8a8a0aaa9539457b082c2bcc791beeef3d43bb2c470cc901214924712c1e658611435ec8a3788e064975d8fc53950c0b91d47c7c51b10d9415937c05c1f9004a70"}, &(0x7f0000000140)=0xbd) 00:54:22 executing program 7: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000200)=""/4096) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0x0, 0x2, 0xd4a, 0x5, 0x9}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x9, 0x1, 0x0, 0x2}, 0x14) 00:54:22 executing program 0: r0 = socket$inet6(0xa, 0x80006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000136000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x4, @tid=r1}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) ppoll(&(0x7f0000ae7000), 0x2000000000000349, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f000079dff8), 0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x41d, 0x1e, 0x8}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x9, 0x4, [0x101, 0x8, 0x1000, 0x1000]}, 0x10) 00:54:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x181000, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='skcipher\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000001c0)=r2) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d66593ae164c990a0028e", 0x10) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f00000000c0)=0x3, 0x8) r4 = accept$alg(r0, 0x0, 0x0) read(r4, &(0x7f0000000bc0)=""/93, 0x5d) 00:54:22 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = msgget$private(0x0, 0x1) r2 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000000c0)={0x4, 0x3, 0x1, 0x20, 'syz0\x00', 0x4}) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000000)=""/188) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r3, &(0x7f0000000140)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000100)=0x70) 00:54:22 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000ddfffc)=0x1, 0xfe8c) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0x9, 0xfea8) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000000080)="b4", 0x1, 0xc050, &(0x7f0000000240)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 00:54:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) 00:54:22 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='[,ppp0-{vmnet1\x00', r0}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r4, 0x4}}, 0x18) ioctl$KVM_SET_CPUID(r2, 0x5000aea5, &(0x7f0000000000)) 00:54:22 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x1, 0x1, {0xa, 0x4e22, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0x64}}}, 0xfffffd38) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:22 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000100)=0x54) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xb, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) 00:54:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) socket$inet6(0xa, 0x0, 0x5) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdirat(r0, &(0x7f0000000140)='./f.Le0\x00', 0x0) getdents64(r0, &(0x7f00000002c0)=""/243, 0xf3) 00:54:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0xfffffffffffffe68, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x430001, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000200)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) 00:54:22 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x4000000000000000}}, 0x200000d8) 00:54:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x1) ioctl(r0, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYBLOB='#! ./file0\n'], 0xb) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) fcntl$setstatus(r1, 0x4, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0)) dup2(r1, r3) 00:54:23 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'\x00', {0x2, 0x4e24, @broadcast=0xffffffff}}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x4, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u', 0x2c}, {@cache_mmap='cache=mmap', 0x2c}, {@uname={'uname', 0x3d, '\x00'}, 0x2c}, {@cache_loose='cache=loose', 0x2c}, {@mmap='mmap', 0x2c}]}}) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) 00:54:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x20101, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000380)=0x80000000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0xb4, &(0x7f0000000040)=[@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @loopback=0x7f000001}, @in={0x2, 0x4e20, @rand_addr=0x2}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e22, 0x6, @empty, 0x8}, @in={0x2, 0x4e24, @rand_addr=0xa51}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0xe}, 0x7}, @in6={0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x80000001}, @in={0x2, 0x4e23, @multicast2=0xe0000002}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000300)=0xd4) clock_nanosleep(0x1, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000200)) exit(0x7f) 00:54:23 executing program 7: syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="a29ab0893fde", [], {@ipv6={0x86dd, {0x0, 0x6, '?:T', 0x14, 0x2f, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @tcp={{0x0, 0x883e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) r0 = semget(0x2, 0x3, 0x640) semtimedop(r0, &(0x7f0000000000)=[{0x4, 0xffff, 0x1800}], 0x1, &(0x7f0000000040)={0x0, 0x989680}) [ 147.265587] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000202) [ 147.273048] FAT-fs (loop4): Filesystem has been set read-only 00:54:23 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f0000001880)) [ 147.333815] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x3 [ 147.348845] IPVS: ftp: loaded support on port[0] = 21 [ 147.394963] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x3 00:54:23 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) fremovexattr(r0, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00') [ 147.469720] sd 0:0:1:0: device reset [ 147.509378] sd 0:0:1:0: device reset 00:54:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000140)=""/94) ioctl(r0, 0x0, &(0x7f0000000200)='0:') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sctp\x00') ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000001c0)) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x19, 0x201, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 00:54:23 executing program 7: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {r1, 0x6}}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x7, 0x400102) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f00000003c0)={0x8, 0xffff, 0x4}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xfffffffffffffff3) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000100)=0x1, 0x4) socketpair(0xb, 0x3, 0x2bf, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_RCVMTU(r6, 0x112, 0xd, &(0x7f0000000180)=0xbb, 0x2) r7 = socket$inet6(0xa, 0x5, 0x8002) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010226bd7000ffdbdf2502000000000003005c00000008000200d50000000800030011000000080202000a0000000800040001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000640)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000680)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f00000006c0)={@mcast1={0xff, 0x1, [], 0x1}, r9}, 0x14) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000], 0xbb}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) 00:54:23 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f0000001880)) 00:54:23 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x1) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000080)) r2 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x5ac, 0x4) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @loopback=0x7f000001}, 0x2, 0x1, 0x0, 0x3}}, 0x1b) getpeername(r2, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) [ 147.699772] sd 0:0:1:0: device reset 00:54:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = timerfd_create(0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x7ff, {{0xa, 0x4e23, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x1000}}}, 0x88) timerfd_settime(r2, 0x3, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) dup3(r1, r2, 0x0) 00:54:23 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4) r1 = socket$inet6(0xa, 0x6, 0x8002) r2 = epoll_create1(0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f00000003c0)={0x32e9, 0x9}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) r4 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)='\x00', 0x0) keyctl$instantiate(0xc, r4, &(0x7f0000000500)="49721398f159c8d4da1f1103162a60d3c0aa844d74350e17cd8169396b73d74aaed4cff5e24b14ac865217fe3bbdb51cfc73d50ab7455560a04ac8c08f4b0c170c5265a93b1238a89b43ddda34b3b49d9357912f61d6273077020ee4387105509303c96edc209eb421", 0x69, r4) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x4, 0x7, 0x6, 0x7260000, 0x3}, &(0x7f0000000440)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000480)={r7, 0x3ff}, 0x8) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}}, 0x1c) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x80001, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x108) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) 00:54:23 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) sendto$inet(r0, &(0x7f0000000000)="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", 0xfd, 0x80, &(0x7f0000000100)={0x2, 0x4e24, @loopback=0x7f000001}, 0x10) 00:54:23 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f0000001880)) [ 147.899726] IPVS: ftp: loaded support on port[0] = 21 [ 147.900982] Unknown ioctl 44640 [ 147.965912] sd 0:0:1:0: device reset [ 147.980324] Unknown ioctl 44640 00:54:23 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x200000000000}}, 0x200000d8) [ 148.245114] IPVS: ftp: loaded support on port[0] = 21 00:54:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x80000) keyctl$join(0x1, &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}) keyctl$join(0x1, &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}) 00:54:24 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000003c0)={@empty, 0x0}, &(0x7f0000000400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback=0x7f000001, @in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4e20, 0x8, 0x4e20, 0x20, 0xa, 0xa0, 0x80, 0xaf, r1, r2}, {0x1, 0x4, 0x0, 0x4, 0x3, 0x4, 0x5, 0x23}, {0x3, 0x800, 0xfffffffffffffffe, 0xfff}, 0x8, 0x6e6bbc, 0x0, 0x1, 0x3, 0x3}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4d4, 0x3c}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x34ff, 0x2, 0x0, 0x400, 0x4, 0x3, 0x3}}, 0xe8) r3 = socket$inet(0x2, 0x2, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r4, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) 00:54:24 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f0000001880)) 00:54:24 executing program 4: r0 = semget$private(0x0, 0x7, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f0000000140)=[{0x3, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0x1}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}) unshare(0x408010000) 00:54:24 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="63cdf551a5ce81a48d3e68", 0xb}], 0x1, 0x8) clock_nanosleep(0x3, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000400)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0xf) 00:54:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x2}}, 0x200000d8) [ 148.365610] sd 0:0:1:0: device reset 00:54:24 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x8, 0x1) renameat2(r1, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x5) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x4, 0x9de3, 0x4, 0x2, 0x0, 0x100000000, 0x241a0, 0x3, 0xffffffff, 0x800, 0x3, 0xffffffff, 0x185f, 0x0, 0x200, 0xb891, 0x0, 0x8, 0x9, 0x800, 0x200, 0x4, 0x4, 0x3, 0x200, 0xb2, 0x8, 0x4, 0x1, 0x77b1, 0x7, 0x2, 0x80000001, 0xfffffffffffff207, 0x1, 0xe9c2, 0x0, 0x8, 0x0, @perf_config_ext={0x7fffffff, 0x7}, 0x2104, 0xff, 0x20, 0x4, 0x3, 0x1, 0x5}, r1, 0x5, r0, 0x3) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:24 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:24 executing program 7: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0xfffffffffffffeff}}) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x2440) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000080)=0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000100)) 00:54:24 executing program 5: socketpair$inet(0x2, 0x802, 0x50000, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r1, @multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) r2 = socket$inet(0x2, 0xfffffffffffffff7, 0x6) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) [ 148.539992] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684242 /dev/loop2 [ 148.583479] sd 0:0:1:0: device reset 00:54:24 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:24 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0xfffffffffffffffd, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x4c800) bind$unix(r1, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000004c0)={0x0, 0x8000, 0x20, 0x1, 0x8}, &(0x7f0000000500)=0x18) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000540)={r2, 0x10000}, 0x8) getsockname(r1, &(0x7f0000000340)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f0000000440)=0x80) unlink(&(0x7f0000000640)='./file0\x00') r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000580)={0xffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000600)={0x7, 0x8, 0xfa00, {r5, 0xf44}}, 0x10) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000300)={0x3, 0x8}) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000700)=[{{r6, r7/1000+10000}, 0x835, 0xffffffffffff7fff, 0x8}, {{0x0, 0x7530}, 0x100000001, 0x7e36d0b9, 0x100}, {{r8, r9/1000+10000}, 0x4d2, 0x3, 0x7f}, {{}, 0x1000000, 0x800, 0x1ff}, {{0x77359400}, 0x4, 0x7ff, 0x8}, {{0x0, 0x7530}, 0x7ff, 0x1, 0x4}, {{0x77359400}, 0x1, 0x7, 0x4}, {{}, 0x1, 0xf4a4, 0x100}], 0xc0) recvfrom(r3, &(0x7f0000000880)=""/55, 0x37, 0x40002001, &(0x7f00000008c0)=@generic={0xf, "5f74e589ac88cbd8773725c73c9d23525894a814c3c303e56540d396db5d04413d265c0f023899883a5d2945e83b5361c48ab673b8f06eab5a9a73d4413ca06295629b990abfa9c51d1300bae62a30570c72f2fbbc94ae50f7e7804767aafe1d496dd71ec816c49469f297b5a8aea9c9c8dfccaf2d8e6f8d9a1b99f9fc8c"}, 0x80) setsockopt$sock_int(r4, 0x1, 0x2f, &(0x7f0000000200)=0x6, 0x4) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000140)=0x1000, 0x4) r10 = getpid() perf_event_open(&(0x7f0000000800)={0x4, 0x70, 0x6, 0x9, 0x7, 0x2, 0x0, 0x100, 0x100, 0x4, 0x7, 0x3, 0x255e000000000000, 0x40, 0xb, 0x868, 0x7fffffff, 0x0, 0x1, 0x7, 0x200, 0x6, 0x7, 0x7, 0xf3, 0x8, 0xfffffffffffffffc, 0xd9c, 0x7ff, 0x101, 0x0, 0x7fffffff, 0x8001, 0x0, 0x7ff, 0x10000, 0x4, 0x2, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f00000007c0), 0x4}, 0x4400, 0x0, 0xdb, 0x1, 0x2, 0x7, 0x884700000000000}, r10, 0x3, r0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r4, 0xc0305710, &(0x7f0000000480)={0x1, 0x7f, 0x9, 0x3}) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x1, 0x2c, 0xd0f8201, 0x6b54, 0x0, 0x9e, 0x14000, 0xc, 0x2, 0xcb77, 0x8, 0x3, 0x1, 0x5, 0x200, 0xca, 0x6, 0x5, 0x2, 0x0, 0x7f, 0x3, 0x400, 0x1, 0x1f, 0x0, 0x1, 0x6a, 0x20, 0x1ff, 0x9, 0x7d25, 0x4, 0x2e, 0x8, 0x18, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x4, 0x100000001, 0x5, 0x8, 0x2, 0x4}, r10, 0xe, 0xffffffffffffff9c, 0x1) 00:54:24 executing program 7: mlock2(&(0x7f0000570000/0x2000)=nil, 0x2000, 0x0) r0 = socket$inet6(0xa, 0x7, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = dup2(r0, r0) ioctl$RTC_AIE_ON(r1, 0x7001) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f00000003c0)="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") getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000380)) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000000)=0x9) mremap(&(0x7f000004f000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) 00:54:24 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) 00:54:24 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = semget$private(0x0, 0x3, 0x4) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000040)=[0x9, 0x9, 0x9, 0x3, 0x2, 0x0, 0x100000001, 0x10000, 0x280000000000000, 0x40]) r3 = socket$inet6(0xa, 0x3, 0x400000000005) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0x9e, 0x4) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffc, 0xc4, 0x80000001, @buffer={0x0, 0x49, &(0x7f00000000c0)=""/73}, &(0x7f0000000140)="e8e2a68400139cbcf66050a2375ac0cd449b5341171bb65d6e4ff18e719ed233b3d8af71140e97f252cbab6cfd3d823960656eb2fb15606f8d156b54a50e09bd0fc4fd4754dc7bd104e88f48f7eb2f2a210ba90e469982c82b696c189e227e57bf46b251a0205417c7953cfe57aa979b86e7b8136d5676fba9e30371ca73fdcde442936708601b09d477c31e04b5ca1bbba5c2bbad2efe27ae2ea16d68d0046c6121d308f77aa67ef2b7659f5f5d155ecf4106b02182035d8e8789c6865d533e8dd4fd38", &(0x7f0000000240)=""/250, 0x2, 0x1, 0x3, &(0x7f0000000340)}) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) [ 148.800233] IPVS: ftp: loaded support on port[0] = 21 [ 148.849473] sd 0:0:1:0: device reset 00:54:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:54:24 executing program 7: unshare(0x20000000) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0xb8800) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x80, 0x7, 0xff, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) ioctl$TIOCCBRK(r1, 0x5428) ioperm(0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) clone(0x0, &(0x7f0000000380), &(0x7f0000000080), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) clone(0x0, &(0x7f00000003c0), &(0x7f0000000500), &(0x7f0000000300), &(0x7f0000000340)) 00:54:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xc}}, 0x200000d8) 00:54:25 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:25 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:25 executing program 4: r0 = semget$private(0x0, 0x7, 0x0) unshare(0x40000) semtimedop(r0, &(0x7f0000000140)=[{0x3, 0xfffffffffffffff9, 0x1000}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0x1}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}) unshare(0x408010000) 00:54:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:54:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) 00:54:25 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'irlan0\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) [ 149.285593] sd 0:0:1:0: device reset 00:54:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x581582) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = semget(0x1, 0x3, 0x482) semctl$IPC_RMID(r1, 0x0, 0x0) 00:54:25 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x7cb7, 0x4, 0x0, 0x3}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={r3, @in6={{0xa, 0x4e21, 0x200, @loopback={0x0, 0x1}, 0x10001}}}, 0x84) getpeername(r0, &(0x7f0000000200)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x2a0) 00:54:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) 00:54:25 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x14) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:25 executing program 7: setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x22, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000300)="29d7e1311f160577651070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x0) ioctl$sock_bt(r1, 0x0, &(0x7f0000000180)="2a5325807efa75662bf31a2975f9e48b4fc9d465dbb564a8bd4be26fd2ec5f8e7ec51279631ddef66cc37a98207409ede8365c5d77d64f096e88d4417a8e4bb7f6395ea2d01322f71f49649ae2cd5ecb0eee7495fa72d584335485d59921b753dc518afa9216a2b95627ee2b2002402f63ab378a11a04273f819165cd5874e5ff0f416641d54503b8a8c8688d1320d7c18eee4f31676aeb3b6e4ebc608f7ef466c5283142ba820c5b6575b072bbe8b455369881660db961fcbe7be6b843aa690c4282d956ea186da13883442290dae5673def08884f72221cfc676141f882544d6fb6176") getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000140)=0x78) [ 149.490444] IPVS: ftp: loaded support on port[0] = 21 00:54:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40000, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000080)=0xa2a) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0x5, 0x4) 00:54:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x20000}}, 0x200000d8) [ 149.522905] sd 0:0:1:0: device reset 00:54:25 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x59fe, 0xcf2d, 0x1, 0x0, 0x1, 0xfffffffffffffff8, 0x1, 0x7d7, 0x80, 0x2f623b4d, 0x80}, 0xb) 00:54:25 executing program 6: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') [ 149.757972] sd 0:0:1:0: device reset 00:54:25 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) [ 150.013710] IPVS: ftp: loaded support on port[0] = 21 00:54:25 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) mq_open(&(0x7f0000000040)='\x00', 0x800, 0x197, &(0x7f0000000080)={0x1, 0x2, 0x632f, 0x2, 0x2, 0x2, 0x7f, 0x20}) ioperm(0x131a7b7b, 0x10001, 0x1) 00:54:25 executing program 7: capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0xffffffffffffffff}) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f00000000c0)={0x20, 0x28, 0x1, 0x0, 0x0, {0x1}, [@nested={0xc, 0x0, [@typed={0x4102, 0x0, @pid}]}]}, 0x20}, 0x1}, 0x0) 00:54:25 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='Wself.wlan1lo\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:25 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x100000000000000}}, 0x200000d8) 00:54:25 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') close(r1) [ 150.175932] sd 0:0:1:0: device reset 00:54:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') 00:54:26 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:26 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x37, 0xefd, 0x0, [0x800, 0x100000001, 0x3, 0x100000000]}}) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) [ 150.269543] sd 0:0:1:0: device reset 00:54:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) r2 = getpgrp(0xffffffffffffffff) r3 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0x8) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3, r0, 0x100}) 00:54:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) [ 150.332474] sd 0:0:1:0: device reset [ 150.373219] IPVS: ftp: loaded support on port[0] = 21 00:54:26 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:26 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400001, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000180)={r0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$P9_RWSTAT(r2, &(0x7f0000000300)={0x7, 0x7f, 0x1}, 0x7) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f0000000040)={0x20}) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) sendmsg$can_bcm(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x1d, r4}, 0x10, &(0x7f0000000500)={&(0x7f0000000480)={0x5, 0x0, 0x2, {}, {0x77359400}, {0x4, 0x6, 0x6b1a, 0x4c}, 0x1, @canfd={{0x0, 0x0, 0x80000000, 0xb53f}, 0x27, 0x3, 0x0, 0x0, "79e4c351385cc72c9850f8d2cc8bf8219039a941289de57529f8bb7b217eafffeed3270787a576485c94740d9727633d0c0ce712078be0222f8b184e73209980"}}, 0x80}, 0x1}, 0x0) accept$inet6(r3, 0x0, &(0x7f0000000240)) connect$l2tp(r1, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x4, 0x2, 0x4, {0xa, 0x4e21, 0xa17, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x18}}}}}, 0x3a) ppoll(&(0x7f0000000040)=[{r1, 0x8000}, {r0, 0x8460}, {r0, 0x1000}], 0x3, &(0x7f0000000080), &(0x7f0000000100)={0x9}, 0x8) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x6ca, 0x4) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f00000001c0)=0x80) syz_genetlink_get_family_id$fou(&(0x7f00000005c0)='fou\x00') 00:54:26 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') 00:54:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x74ee, 0x5}) clock_nanosleep(0xfffffffffffffffe, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000040)) [ 150.621415] sd 0:0:1:0: device reset 00:54:26 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:26 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x78cb, 0x100000000, 0x800c, 0x10000000000000, 0xf95, 0x8, 0x3, 0x6, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0x4, 0x30}, &(0x7f0000000140)=0xc) fcntl$setflags(r0, 0x2, 0x1) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = dup2(r0, r3) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000300)={0x5b9, 0x0, 0x1, r5}) r6 = accept(r3, &(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000200)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000240)={0x36ff, 0x7, 0x4, 0x101, 0x10001, 0xac8, 0x10000, 0x3, r2}, &(0x7f0000000280)=0x20) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r0, &(0x7f0000000000)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xc000000}}, 0x200000d8) 00:54:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/anycast6\x00') 00:54:26 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) ioctl$sock_bt(r0, 0xdd17, &(0x7f0000000080)="cd7867038fe8774f85aeb6de165d79d7662a19bc6bb175a69a6cd035f668db0a48c36d7ff3f0dd7e75788bfbc0e8a3497186df41626162e22484a2d2110993c9b3c3b90be61b298ed0d1efcefb57874f021a85108d011dadc9a61cdf1e21b485d458a564d321654115f7ab053680fd04a089c48108da76f268cd8680483e04ab45a9aef5f4e2933823de87217edbf97acf104dd1b9c1f3f97afd0dc8b8c16a62e6") 00:54:26 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:26 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:26 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x87, @multicast2=0xe0000002, 0x4e22, 0x1, 'rr\x00', 0x0, 0xfffffffffffffff9, 0x28}, 0x2c) [ 150.987906] sd 0:0:1:0: device reset 00:54:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x40) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x4, 0x40, 0x101, 0x2, 0x0, 0x7f}) 00:54:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:26 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) [ 151.049606] IPVS: set_ctl: invalid protocol: 135 224.0.0.2:20002 00:54:26 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) [ 151.127464] IPVS: set_ctl: invalid protocol: 135 224.0.0.2:20002 00:54:27 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 151.219472] sd 0:0:1:0: device reset [ 151.238885] IPVS: ftp: loaded support on port[0] = 21 00:54:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:27 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x12100, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20000, 0x0) [ 151.365488] sd 0:0:1:0: device reset 00:54:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xfffffff5}}, 0x200000d8) 00:54:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:27 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:27 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x33e, 0x80000001]) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x7fff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000840)="e39a893f2d10631c3e170375dd6c53af19178bc675005bc4fdc9f26fdc69bd52f4b8e4b68e57703e6f8e3abc2c98408d07edbb5d802612ff0138736aaacc54904720b7b9cf21036db253293ae3b5663d233f3b417f9f455212d056a6ed38a3ff2b9c0ef6f10197592b97d855ef726ffb1adbad58b2f6f4cf482f8c70fad9e81dd909065e00f52bd8365ffb1f3f86f924ac4f921aadf0e7427c94f82ea626b967ed5d25472034ffab8ac8b9b8e03be0c27be0a32079b9eccfcefb8414695068b2cb3ce449d141682e0cd14bd6a26f8ceaa75d8e9fe65a43298290bd99", 0xdc}], 0x1000000000000073) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:27 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:27 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000700)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000003a80)=@assoc_value, &(0x7f0000003ac0)=0x8) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:27 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 151.687501] sd 0:0:1:0: device reset [ 151.711933] sd 0:0:1:0: device reset 00:54:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0xa, 0x5, 0x84) write(0xffffffffffffffff, &(0x7f0000000400)="3e0000004e001f00ff03f4f9002304000a04f511280001", 0x17) ioctl$sock_SIOCETHTOOL(r1, 0x89fb, &(0x7f0000000000)={'sit0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="fdf14000400000000100000000000000000000001e66e1727e0cbcec20f9431229d6ebd32f71636c8b5acc24e047d4955108a15fdf7fd4469b1fc0ac"]}) r2 = socket$inet(0x2, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sit0\x00', 0xffffffffffffff9c}, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000100)={0xbb, 0x81, 0x9, "1fc2442b3cd29acdec8ed34557132d16c92429311e9ef56df2ba0e3e3f7ab312de866e6f10eedcdc4d4c3f0c0e44ac4b35fb76965bf9ddc7a6ecd5b347f32e7033c4d2a429662607766622757580b18dc67e906df7799ce5c1649468aaacacbccf6f7d2ff61a6b14fc3289dfe994469b2ddb0a6e45be7f097cd93b894f3a225bcf9468584c20ad9797ff2cc6689b3493d9dd5fc1885b7c6b16c6e595fb8dc1a4e8139f0bec6e87e78fa593c5ec46c595bb7808fe8ba655cb3e8ae9"}) getpeername(r3, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80420000}, 0xc, &(0x7f0000000340)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x2a0}, 0x1}, 0x40800) 00:54:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:27 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x8200, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000080)="4dd8197ad7fd29ac8b306b866234e97be7fba24baafa49ec2fb5f329453c5ca1330c007b06ecf3ee9c8267b210518f134d6a58a6a807beb38c2cbabbc0971e77774d4b5e294817d3cf3b41ee6ea9a2fa05c92c9110839d6a26b47ff9c7ce7bac3ceb63a665e935ef188ee2cb3e8c7809ef9118dbf11e556cbeec2926eccfec228f753c8614b6f812555759d785cb8f61e8e70248ac7699150c80946c2c5493e7e555cc2826108a98a84639d1cc36975554ceaf42ec5be16a82d1f5d81efe775b28bb15", 0xc3, 0x0, &(0x7f0000000240)={r1, r2+10000000}) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001740)={r3, 0x28, &(0x7f0000001700)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001780)={r4, 0x1, 0x8}, 0xc) r5 = add_key(&(0x7f0000001840)='asymmetric\x00', &(0x7f0000001880)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000018c0)="1490bea1f9bf023054d5548b0410877c16cdc076d9fa8182654dfa6563390a1e93f911b8c223c1ce956cc00bc6143ec2534005f07b8b286c444d862b3015f4a5769508fe6007858ed54eca8b30e8fdc499f99ed71c3f801c02171c827fc8d177c6e6375455b61c1e66002f6ddc27aeb27573", 0x72, 0xfffffffffffffff9) r6 = request_key(&(0x7f00000017c0)='blacklist\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001800)='wlan0trusted)cgroup\x00', r5) r7 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="5155b9bedd6a9603e665cfd53eeaa64b88042791f2a4042ad0a597a686c9aacfb26a83df3dd4e92759504bf40a2dbac250dbeee96dcfb6060b7a63f8670dd54e580610a14c158571", 0x48, 0xffffffffffffffff) r8 = request_key(&(0x7f00000004c0)='rxrpc_s\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000540)='$:\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000580)={r6, r7, r8}, &(0x7f00000005c0)=""/179, 0xb3, &(0x7f00000016c0)={&(0x7f0000000680)={'mcryptd(sha512-ssse3)\x00'}, &(0x7f00000006c0)="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", 0x1000}) socket$xdp(0x2c, 0x3, 0x0) 00:54:27 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:27 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) [ 151.841654] IPVS: ftp: loaded support on port[0] = 21 00:54:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x200000}}, 0x200000d8) 00:54:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 151.956424] sd 0:0:1:0: device reset 00:54:28 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) setresuid(r1, r2, r3) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x40, 0x0) sysinfo(&(0x7f0000000040)=""/131) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) bind$netlink(r4, &(0x7f0000000480)={0x10, 0x0, 0x25dfdbff, 0xc004100}, 0xc) 00:54:28 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:28 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x81, 0x84900) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x1ab, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x4}}, 0x18) r3 = socket$l2tp(0x18, 0x1, 0x1) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000240), r2, 0x2}}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000440)={@mcast2={0xff, 0x2, [], 0x1}, 0x7, 0x3, 0x0, 0x8, 0x10000000000, 0x9, 0x1}, 0x20) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) fremovexattr(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="62f47266732e2f6465762f698e9afcc4916d6f757365230031c1b2566ceade32610e"]) getpeername(r3, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 152.333506] sd 0:0:1:0: device reset 00:54:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x80) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x6888) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:28 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 152.439144] IPVS: ftp: loaded support on port[0] = 21 00:54:28 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 152.539666] sd 0:0:1:0: device reset 00:54:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x2000000000000}}, 0x200000d8) 00:54:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40040, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x41) getpeername$packet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x11) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000140)=@can={{0x3, 0x3, 0x800, 0x100000000}, 0x1, 0x0, 0x0, 0x0, "34b3bfa6217c05dd"}, 0x10}, 0x1, 0x0, 0x0, 0x20000811}, 0x40) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 152.694904] sd 0:0:1:0: device reset 00:54:28 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:28 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:28 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x80) write$P9_RLINK(r0, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000040)) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) r2 = socket$inet(0x2, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r3, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:28 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) [ 152.867515] sd 0:0:1:0: device reset 00:54:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:28 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:28 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) sendto$llc(r0, &(0x7f00000007c0)="49d24426f8582ec2895a275dfeadc92d370d45f692ee1187834877ea16cb36125cc7dea9c9362150b5f2d2a4c741d43a984d792cf404f21652c3fe94046739a72158e99ff1159db68c28f8f368fc663217ba5f643ba57e4f91d06fedac40748229cf179eedbb740fdd8e2ba644113f656580c3da96bf95e2d1e78be96dcba45ae4fd11e39950ab2ad5af9f55ccd64106fe05c3877939aa71d5bc1fed7a7a38a6be8d46c84342bf2eb81e9ac321dd7808fb8afefac13cd69657e842a9134c1938fbcf5a90e5f193c3f9bc933861ea8460e7ffc8f62de213f1812a10f10c9d861a3dea683aecd1ed6d2fef6bd4dcad831af440b8f38051ffb14d01abbc5dc0812af91c13cd7bc406dff0d0301a6916462200e35dece7307953f4c7a8527fcd9da64e7eee0a1c699bb1f0032823195f5bf58364b0abf9a18ebb15bf596b941406eae300d69a8725c6a46dbeaeddc76676c76ba15b7447a3c89e315b679952916f3b19d09f47b98c57273b33e34bc380647e3116798b7c12359446b468dea7395278b27baaa3a37cf3b9ebf9f93814d6ae83917110a011e1cce546eccb4f7cf2dfb7b9160a6d8f326f8103fbc2738c495b158fed473d6aaff7e83357ec45df11cc7719485a3efe361644855a94aaba06866b9d229a3bbee0d028f7398c36f088fff5ded34b2796307311916528b0ef290dd93da95e1691c13deb5a5b7949201d3f72e35b29176a55208c788bfe31ef00c0c3c3e519f1c133d054eb41a2750b041100256154c7f7da26fd0d1a95bbf05f5286f963eed14eda51f602f5bff5a99c425dae7fb2a8a9f9660954cb99df1d2858379c5f3754d2997c13d991d333cc6dadbf99afc754cc766552f858b966461bbfa7495fc73136cb13db6fb31efa16f993c14510bf43c19e63eb861859301f7b73ebc62ca89ea79592457dea8efea04d7ed0db7b1101b5ae97590d3fdf334ce324f671187b46120d82015273e86fb401cb85e4a78c35f9dfbed5775efd30571e7632f7dd22f1fe9418e82c114302765f616a68ae05348b690ba5d8978e590c318ffdfaa25ac56140a149ceb052a32b28cfcc678371a25851f0f50af51f9b2798253bfce155eb5340eb7874bb35127d0838bb931d75ffe254f7ca117e7a03609064f900ee5781aa0bcca7281e0ca258767a8f71619ddaa33c4881e56ec99ba22db6379e677333faa8abb30aff87f6a09f535154af2cb218d9796ce309ab3c4a1290aea3f79baf8446c9591aa1ab3833e4c20d253869e49bd17d04de98d7385a71ee1626f5bcb9e5505a78abe084ed44266557eb9dc62fc36e3aff042bc855651714e97137ef58a47e4dc9b475d831c5bc1e3ec7105f34d26a34be3536beacf0187ffd9c5e3209472f730589e03da469aa9728ada180c56df24e03e2264957d824e2f2db794e1615584f5291a4e60a4bece94914040fe9f8d1c2a5449024dfed873d5fb9afc1dc515039244df63bfeacf4103f83562054216a8570d20865ef180373d6de2d5933dfb37def039eb56a8c608543cd4b16edb21d1c5d0c51cffbcb6650b839cf772f9ce028a2dd5fb8eab8e29f9a93c87edd881a35233e093176f7616216366da1eee6e92d64ae857fb7405c13b60ff7be938aab43d773b05c9b98866bbb71140ab7bfecc77ff99d8d80d49dcf9d96d89e65b24b5aae4345bfa2169c5d01b623f199c940811391d75e94c312d7ae98398cbbce0ad046226ddb1f4d8463689d8f429500e645a4715330d5a583d9c50d5ca2f4a7ab1bfa1de3105c1fdd955d545540285bff37cbee7025eaa557f4be6dec7a04c5adb15d9171d732ee70e35a628f4b22f67bd214182d00d8e0b80c220646e4bbbb0f25b1834a26931d2326071ca6481fe83953b281160adb4f796edc84e361e49deb58568691f7c29c1c5d7fe52811772e5366eb0e5ef5fa249b32b83cab72d0808dd63298fcfbdf82dd1e9c7ce8b3d21e7392a9de731bae7f301df634ac6c8342ddb33fe22889e047a55513a46679699e56526cf58052b5121316dc1c0fefadf4076dadeec33930ae8bd56e040a0b980e5dfe65adcb3c5f416aeeb2b1e3d50a7242ad651d3d13a8a753c07aa534e811019763ebe7cda60f03109289a00673dd677deb243c488b8b47949a00bac91587440124c6daa2d15482853481fa1a85049695ff3cf6b6c58a01b94066f65c441f82137666d26aa39dee0daeaa6ac2c41d8d2b39074bd7d9f0f060b6a881394f2ceb2f14af91c0ee903eb44bd3a99c6bb511373d35d8cb6ee3ff326b4955d3fa773ded3deafa6d9c42ae85667183f5110948f0f9ab7c323ee28162fbec68fd87c320bab12329d4fba7d4921da1f29d3dd43da3e365b2446333b2f306fb238de04c36c0cdb7dd98921640cce8235fbb542b87bbb45ebdc47c1e1b62cb50ab943e8c8d1caa4b0ca7adf2134d26683683e893b343813d6edf4133c1a380251f53d1bcf3a0a65beb9df45404ba09cf7164c772bc456ed79b44693f966ecb039daabe32ca2ffde5c2cac96028163231d8592fc7d39faf670c9a44e7f1e086eba4ecb44e4418a89013554a899dd868d89f83181329535a98d4ad89f12252754b3aad57c404d2d0ab5b7bac7f74ca25c304232df6d806293292a11c0e6dd4129f29e9c4c6b549022ca6feb6133af4f1d836d0d7c024ee4ace5bd2a08ab391dfc800cf1708851b0512d87c0b1e9b8d8501324cb943d3466c346e506718cafa9a39483abc260e9056657cbc1fb2ad20d08ade85727d388f165449d45b2f339e4ccd4b7032827feea7c3bdb2bea0b94e1b07fb1e64bf19644e4247078630d031eaa251e956060745ed60b0898dc163de9ab5d18cd6149aa7e08983747d3cfa5acdae36ebce66c90eb26357eef97c52ac4ae7128d57b23938ddeba9fbfb77ebfd84373ce4f23e25d2045d3348fa8652e09238ce7af62790f17ec6cd27fdf1dc5e530e0d87941aaa8d3e41667abd8d01b4db1552ad8abf41eff60df4e707f3140fcae08d19ab72f8fccd03d564f69f93a1550dbaaeee5b5cb585f9e26c89b8cd7b5ae8357bef59d39b541c39ff6f8e98613c4a8ac5eda534bf2350eab26cfc7e5136063b8279a472e8f5fdf45de0a5cd16cd43d5b3f0ce5d4bc62e31eaa01fe5186a255ed9fcaf6a757910c1e61709b4990fd0c25d7a7b73799923f6fc953f03b43a830583e2857aca87781642af5bc2edd3dc408ebe93aaeaab9fa414bd40b469d9bd43b1d90dd4675ebd22168bbe09e27d2d6a8a1655227d6d6f27d30c15df1efdf67c5119e5cee383e99356ed0ec51266bbba2478a582a70f723c747bbb2ad205b28ba037eac8374d6963c27c02ace62ec572d4fa50601864da85d0ba53fbccb879c011e054ef3fd5b9d7be472f0a4640a339bce17f11a864d99d1a4ce87f1a8cfaf96efc32740446994e2df526913653f96b4e8e19ad2d3328cac2f091e10dad76f7e289f177046a7ecc9631e0c6a4153a2a687851ab9b1b889f106b4d79dfb5f62d9a7aa5175f786c2de7fedb13d6f1a0f53599219eb444d5e26170ca9b9461109fda650096798b729f011a30cd88b66dd0bfc6b5cce6fef5c87e5a7a555d261b17fcb4cc230050275cc3c76a6184f4b843b62f119debbba8927d45be5c55b0c89e9d0d9643c9402b22e674c663fa26f815e11032491d26caf11a87bd40afb5b8a5112b7feb6f07c0fcca36df99c488d73f62b4d191a8c1d0dee1ff765c7a9564b0403bc35f127cbcc87f4c0d0046b4cb0618c4198ccc2b7eb4d336332d8f7d7d872bfb07511505972297a09ec812535b75ef958d24f2ca13c04b1fd284e4446081ff6838a6eb6f9aa38750f146bd23ff2482a2cbe16e115f65d38a45f09184a354d5db714d789ff0ec95afffefcfec70a41bf6d75a9d585ad8b69fcc566ebe261ce58f6dbcf3d17dd452f0092cd7dfecd58c7f9abfb9ca75240bfd9981038ef1f04963389ec1e4f353a824289023a0fccf07cb1218ea2f8112fde3ac83ccaa53914066998716fc7d8eaa87fa576c2573261818800fdcec3727b726777b9e7d2b7cf7668bfdd1953d0ca1754aaa138cf54663a4d66a970fabd4ba0beb497282cc8918708939f066e3e6699f0858daa7ffefc7965d40cc81a48fd4942b2bfd3d301d20fd92fd0fb6bed5a1e1fc45944a38a100d17dae6088420c9d53ca71cec4defbacd95dc4715b2ed63d4ecbb8b2a9b7357b4fc8510bc5f56b5edb4bbdfe36e31104d6920ab627e91dad03948c3135bd603654ed19b1523d0a397e2f197bcae6dea14e6adba036a788cddc3002aa672975aafe3c9af01c9b40c5e4d116d94ed7cf5f7ef79e2a38960c56ecc43e973eb85a699a0fd4b94a8304bef69e07461ace964aade27190565c6910d8f682746ca0882a61044ecbecdfdeff74228eb97cc44d8b19affa9b4f8c3842e8f3ff310c4dea42ac3271fcc75dbb671bcaa7d02ea4f1fb30c8d7babe6b6f9b256c703e2ac582b82a0d74f598f8612c27fb5e09a3459cfc5dd92781f8a48a049af82651f652112d5247b023daa8d85c5f22acfa4cef49cd7fbcecb621850d427dec8ef9a60441b07e6b068642390fd6b3aa454d1759f8713fafdacec78e74b76bdb9272ca3dfcd51e635e3534dcbc54e031240aaebde95b3ea5031f4974d5aad747416cd63fd5742e725ca6b4f7f3a79f6114470be929dde3a5280a8ac02391b62a8e39d97359712b5f66b0899e6a969cdc55c23a938e36dae88774aa3719b4bde56ef4b6beea8c210880caeb2e1309dd2f64409b898518971df81f49c131ce08a1fa6ea65251cd26d869c410749835dc6af78d23fc974e7b4bf455ef1a06e090aced48cdfeacbc0d48b2063cd0695248a8381b91bb05e852b124707227a2e8267f67837cc95eb57d6db614b81f5cb07b1596a37d724978b950194660e7494da6093538ef9353eea3ea53fb61f53f182ec65e10c52f1cb139b75b6c6a29a3aede0c84ec4d06208ecf807b5c72576309e396d8d0a3e75dfa681c7315f4097d9e5026c56f434fbdbad8ed068b62551228744815064bd2ecafd2f3e4b8d58b3441725814befe416578a534b1eefff61efedc7429c51dea78300335168e99a74b6e2b290d8a809acae223f39adab2b57097e3d76138db956038f6fda9b67273fbef39dfd9cc6a10338455320e14bb8a86159f1e7b494675b2cfc4c402a15b1dca84f91a0135467d65325d50043fd9f3d9fc7e97f207166348599f7fd90863a6e14149ca1ca5bb1ae667eda17d104f5026170ab539e448ca547764770805a0f16244a47a47a3f168b5f6ab2a4ce1a31c4f65174dda64dde18e83b67aa51267d09164859e0588d548e747beaeacf465cb55caaa3c152732e9037e67f6027400fd5bfe0109e8ce22b415b041183f4dbecc66ddc0fc21115e8c1d3c77c4a327106f9890140342bb0b8c826a1ad87926f2e461e7ebb8a52b17f6b2a4278003797c74ad89da6fe6f40219bf9794626b4a6a56fb2c9f5033bc4769f508882613e34e876047de25433878b00a8eab53a45dad651b9b514e27e5b693ee162a7d3c99d5de1b3d402e5854bca0e7dd2e2b748c40c5b367614fdc3cc9d4b4401ae5c5af76f2a896e1ec8ca9c600f069621f4ac53676afbe71ad0bb82f41327d85e5c1c6d2811e2eb90423df3799977a4fcd3b197938273eae9b086b9f88b731419f803cfca9fcdf110596a762899e9ccc6881e1e3d123d90cbeb99644db303af8e21e1e1b08b37b4a11c092f0919e80ec1d0bbb935daed61497ad65416c2dce015b5ea03507190ce6f63511a4b2", 0x1000, 0x4040, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast2=0xe0000002}, 0x4, 0x0, 0x4, 0x1}}, 0x2e) connect$l2tp(r1, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2}}, 0x2e) getpeername(r1, &(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000540)=0x80) 00:54:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 00:54:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 153.068988] sd 0:0:1:0: device reset [ 153.087537] IPVS: ftp: loaded support on port[0] = 21 00:54:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x40000000}}, 0x200000d8) 00:54:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:28 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:29 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:29 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x100, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000140)={r2, 0xc979, 0x20, 0x9, 0xfffffffffffff800}, &(0x7f0000000200)=0x18) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:29 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:29 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r2, 0x24, 0x70bd2c, 0x25dfdbfc, {0x1}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x75}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffffe0}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff2a}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:54:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:29 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) [ 153.497964] sd 0:0:1:0: device reset 00:54:29 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) [ 153.538610] sd 0:0:1:0: device reset 00:54:29 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xffffffff00000000}}, 0x200000d8) 00:54:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:29 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 153.617387] IPVS: ftp: loaded support on port[0] = 21 00:54:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r1 = getpgrp(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000080)=0xa48) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000440)={{0x8, 0x6, 0x8, 0x200, 'syz0\x00', 0x4}, 0x0, [0x3c, 0x22a8, 0x3f, 0x9b6d, 0x4, 0xb80d, 0x9, 0x4, 0x0, 0x6, 0x2, 0x0, 0x20, 0x10000, 0x1, 0xea0, 0xfff, 0x986, 0xd057, 0x1000, 0xf27, 0x7, 0x7fff, 0x7ff, 0x5, 0xfffffffffffffc00, 0x9, 0x200, 0x80000000, 0x76d, 0x7fff, 0x200, 0x2, 0x7ff, 0xe02, 0xeb3, 0x7fffffff, 0x112, 0x0, 0x8, 0x6, 0x1, 0xeb6b, 0x81, 0x9e3b, 0x3, 0x2, 0x3, 0x200, 0x5, 0x467, 0x42d, 0x1, 0x6, 0x40, 0x0, 0x3f, 0x7e6, 0x7, 0x9, 0x40, 0x5, 0x74, 0x6, 0x3fffc000000, 0x10000000, 0x5, 0xff, 0x4ab, 0xf0, 0x6, 0x0, 0x80000001, 0x9, 0x7ff, 0x9, 0x8, 0x20, 0x0, 0x0, 0x200, 0x7, 0x0, 0x1ff, 0x0, 0x7ff, 0xfffffffeffffffff, 0x2, 0x8, 0x8, 0x1000, 0x800, 0x2, 0x4528, 0x3, 0x2, 0xfffffffffffffff8, 0x136, 0x7, 0x1, 0x80000000, 0x3, 0x0, 0xc1, 0x2, 0x6, 0x8c, 0x3, 0x8, 0x800, 0x6, 0xfff, 0x0, 0x5, 0x8, 0x6, 0x1ff, 0x40, 0xfffffffffffffff7, 0x8, 0x8001, 0x8, 0x74c, 0x6, 0x4, 0x8001, 0x100000000, 0x4], {0x77359400}}) getpeername$netlink(r0, &(0x7f0000000280), &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000300)=0x3, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r0}}, 0x18) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000200)=0x3, &(0x7f0000000240)=0x2) 00:54:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 153.754539] sd 0:0:1:0: device reset 00:54:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 153.803806] sd 0:0:1:0: device reset [ 153.903643] sd 0:0:1:0: device reset 00:54:29 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:29 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x1, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x400, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000080)={0x1, 0x6}) 00:54:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 154.214376] sd 0:0:1:0: device reset 00:54:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) [ 154.259073] sd 0:0:1:0: device reset [ 154.272776] sd 0:0:1:0: device reset 00:54:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x1000000}}, 0x200000d8) 00:54:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x4100) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080)=0x3f, 0x4) 00:54:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:30 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) [ 154.412628] IPVS: ftp: loaded support on port[0] = 21 [ 154.451366] sd 0:0:1:0: device reset 00:54:30 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2041, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) [ 154.510885] sd 0:0:1:0: device reset 00:54:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:30 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:30 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) 00:54:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:30 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:30 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r2}) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) socket$l2tp(0x18, 0x1, 0x1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r3, 0x127f, &(0x7f0000000080)={0x80, 0x1b}) sysfs$3(0x3) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x3, 0x0, [], 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000100)}, &(0x7f0000000140)=0x78) 00:54:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xc00}}, 0x200000d8) [ 154.931470] sd 0:0:1:0: device reset 00:54:30 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) 00:54:30 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:30 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000240)={{0x9}, 'port0\x00', 0x90, 0xc1008, 0xfffffffffffffff7, 0x401, 0x5, 0xff, 0x6, 0x0, 0x1, 0x80000001}) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x4}, {r1, 0x400}], 0x2, &(0x7f0000000140), &(0x7f0000000200)={0x4}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000300)={0x800, 0x1000}) socket$packet(0x11, 0x3, 0x300) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) sched_getattr(r2, &(0x7f00000000c0), 0x30, 0x0) 00:54:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 155.118905] IPVS: ftp: loaded support on port[0] = 21 [ 155.173938] sd 0:0:1:0: device reset 00:54:31 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000480)=0x3) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x3, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000140)) r3 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x2, 0x80000) sendmsg$nl_netfilter(r3, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20052008}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="440000000d0305002dbd7000fddbdf250000000431bc533415e1a9318711e88126bdb717f0e5a369d8de69d3faa8a0c241427a68e79140178311e93b398fb1f3d4000000f7e4608e245cbb743c8c2000000000000000a6f310757c95916c367ebc1af33519d535edf9050000a24b9adc2f1850ffdda90100b7c8257f4aa81bd2f3d573ce4d7c0100000098f029057cb54e8481343789c179baffcc5b8dd06b73c63ba621b7b9e46cbadb8144d30464b326fe71787c7c0bd321aa588d5864809f722e8d57f8756edb284f2b2b1f840030cab09b1e45c7e720cc61c6b791312f4c941c"], 0x44}, 0x1, 0x0, 0x0, 0x4004000}, 0x80) futex(&(0x7f0000000040)=0x1, 0x4, 0x0, &(0x7f0000000080), &(0x7f0000000200)=0x2, 0x1) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000240)=""/186, &(0x7f00000000c0)=0xba) [ 155.352994] sd 0:0:1:0: device reset [ 155.389073] IPVS: length: 186 != 8 [ 155.420894] IPVS: length: 186 != 8 00:54:31 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x200000000000000}}, 0x200000d8) 00:54:31 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1000, 0x43c401) [ 155.550356] sd 0:0:1:0: device reset [ 155.581223] sd 0:0:1:0: device reset 00:54:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x414, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r1 = dup3(r0, r0, 0x80000) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x3e3, 0x21, 0x2}, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0x7ab) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000100)={0x80, 0x97ac, 0x1, 0x4}) 00:54:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:31 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 155.773870] sd 0:0:1:0: device reset [ 155.799713] IPVS: ftp: loaded support on port[0] = 21 [ 155.826568] sd 0:0:1:0: device reset 00:54:31 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x7, 0x70, 0x1, 0x1, 0x7, 0x4, 0x0, 0x6, 0x51540, 0x1, 0x5, 0x6, 0x7f, 0x9, 0x4, 0x5, 0x0, 0x5, 0xfff, 0x3634444f, 0x101, 0xfffffffffffffc01, 0x4, 0x1, 0x7, 0x7, 0x9, 0x40, 0x45, 0x3, 0x1, 0x80000000, 0x8000, 0x3f, 0x6, 0x9, 0x7fff, 0xfffffffffffff18d, 0x0, 0x4abdc38c, 0x2, @perf_bp={&(0x7f0000000040)}, 0x0, 0xb4, 0x1, 0x7, 0x8, 0x8001, 0x7f}) 00:54:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:31 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:31 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x4) getsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:31 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x3f00000000000000}}, 0x200000d8) [ 156.180199] sd 0:0:1:0: device reset 00:54:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000000c0)) [ 156.343479] IPVS: ftp: loaded support on port[0] = 21 [ 156.380597] sd 0:0:1:0: device reset 00:54:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 156.577410] sd 0:0:1:0: device reset 00:54:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_yield() clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000200)={r0, r1+30000000}, &(0x7f0000000100)) 00:54:32 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:32 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xffff000000000000}}, 0x200000d8) [ 156.826785] sd 0:0:1:0: device reset 00:54:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:32 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) [ 157.099221] sd 0:0:1:0: device reset 00:54:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:32 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:33 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) 00:54:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 157.270918] IPVS: ftp: loaded support on port[0] = 21 00:54:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xf5ffffff}}, 0x200000d8) 00:54:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x100) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @dev, @multicast1}, &(0x7f00000000c0)=0xc) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:33 executing program 6: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) 00:54:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:33 executing program 4: openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) 00:54:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x3f000000}}, 0x200000d8) 00:54:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:33 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000080)) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x402, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000200)={0xc899, 0x40000000000000, 0x5a53, 0x7, [], [], [], 0x1080000000, 0x101, 0x2, 0x0, "9b98b2d129b6b55279b222837fd397a5"}) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffff}, 0x117, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000500)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r2}}, 0x18) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x400) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000440)=0xffffffffffffff79) 00:54:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:33 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:33 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x4000}}, 0x200000d8) 00:54:33 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 158.081418] sd 0:0:1:0: device reset [ 158.097207] sd 0:0:1:0: device reset 00:54:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:34 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 158.256654] IPVS: ftp: loaded support on port[0] = 21 00:54:34 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 158.330307] sd 0:0:1:0: device reset 00:54:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:34 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:34 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:34 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = syz_open_dev$vcsa(&(0x7f0000002f40)='/dev/vcsa#\x00', 0x1ff, 0x402000) r1 = creat(&(0x7f0000002f80)='./file0\x00', 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000002fc0)={r1}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000003000), &(0x7f0000003040)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000002dc0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/149, 0x95}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/150, 0x96}], 0x3, 0x0, 0x0, 0x8}, 0x4e}, {{&(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x80, &(0x7f0000001740)=[{&(0x7f00000004c0)=""/195, 0xc3}, {&(0x7f0000000140)=""/50, 0x32}, {&(0x7f00000005c0)=""/142, 0x8e}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/180, 0xb4}], 0x5, &(0x7f00000017c0)=""/108, 0x6c}, 0xe76}, {{&(0x7f0000001840)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002c40)=[{&(0x7f00000018c0)=""/45, 0x2d}, {&(0x7f0000001900)=""/235, 0xeb}, {&(0x7f0000001a00)=""/158, 0x9e}, {&(0x7f0000001ac0)=""/56, 0x38}, {&(0x7f0000001b00)=""/40, 0x28}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/64, 0x40}, {&(0x7f0000002b80)=""/167, 0xa7}], 0x8, &(0x7f0000002cc0)=""/244, 0xf4, 0x800}, 0xa964}], 0x3, 0x1, &(0x7f0000002e80)) setsockopt$inet6_tcp_buf(r2, 0x6, 0x21, &(0x7f0000002ec0)="62f2aa268a26b3dfecf84c9adc2ade008e0861195b15d6c0e77f6d9880d8f238deac6ff858b02e550a079c2175a28f1eb39f1bd884cc9dcabb5465dcbf0327af3eec747454e0302e09f3332de666b88198e2b69deafc678b91b277ea24a3568641565a9beacdec99d2b425d1dacff7a48c0d21d8c934", 0x76) fcntl$dupfd(r2, 0xffffffffffffffff, r2) 00:54:35 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:35 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0xf5ffffff00000000}}, 0x200000d8) 00:54:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:35 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 159.247700] sd 0:0:1:0: device reset 00:54:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:35 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 159.399871] IPVS: ftp: loaded support on port[0] = 21 00:54:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400202, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x101, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000200)=r1, 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240)={0x3, 0xf5f, 0x4, 0x6}, 0x8) [ 159.482880] sd 0:0:1:0: device reset 00:54:35 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:36 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:36 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x3, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:36 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x8000000000000000}}, 0x200000d8) 00:54:36 executing program 7 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 160.439215] FAULT_INJECTION: forcing a failure. [ 160.439215] name failslab, interval 1, probability 0, space 0, times 0 [ 160.441773] sd 0:0:1:0: device reset [ 160.450539] CPU: 0 PID: 10913 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #137 [ 160.461597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.470951] Call Trace: [ 160.473550] dump_stack+0x1c9/0x2b4 [ 160.477187] ? dump_stack_print_info.cold.2+0x52/0x52 [ 160.482395] should_fail.cold.4+0xa/0x1a [ 160.486468] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 160.491579] ? lock_downgrade+0x8f0/0x8f0 [ 160.495751] ? proc_fail_nth_write+0x9e/0x210 [ 160.500262] ? proc_cwd_link+0x1d0/0x1d0 [ 160.504348] ? find_held_lock+0x36/0x1c0 [ 160.508444] ? check_same_owner+0x340/0x340 [ 160.512783] ? rcu_note_context_switch+0x730/0x730 [ 160.517730] __should_failslab+0x124/0x180 [ 160.521979] should_failslab+0x9/0x14 [ 160.525789] __kmalloc+0x2c8/0x760 [ 160.529345] ? strncpy_from_user+0x510/0x510 [ 160.533766] ? fput+0x130/0x1a0 [ 160.537103] ? __x64_sys_memfd_create+0x142/0x4f0 [ 160.541977] __x64_sys_memfd_create+0x142/0x4f0 [ 160.546659] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 160.552206] ? memfd_fcntl+0x1400/0x1400 [ 160.556276] ? do_syscall_64+0x9a/0x820 [ 160.560263] do_syscall_64+0x1b9/0x820 [ 160.564161] ? finish_task_switch+0x1d3/0x870 [ 160.568675] ? syscall_return_slowpath+0x5e0/0x5e0 [ 160.573624] ? syscall_return_slowpath+0x31d/0x5e0 [ 160.578567] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 160.583942] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 160.588798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.593989] RIP: 0033:0x455e29 [ 160.597174] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 160.616545] RSP: 002b:00007f408ee47a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 160.624268] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 160.631548] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 160.638829] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 160.646112] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 160.653390] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 00:54:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:36 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) 00:54:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x6, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/102, &(0x7f0000000100)=0x66) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000280)={{0xff, @loopback=0x7f000001, 0x4e23, 0x3, 'fo\x00', 0x0, 0xfeb, 0x49}, {@loopback=0x7f000001, 0x4e22, 0x2, 0x5, 0x3, 0xffffffffffffffff}}, 0x44) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000200)={{0x0, @broadcast=0xffffffff, 0x4e20, 0x3, 'lblcr\x00', 0x3a, 0x1ee000000000, 0x1e}, {@dev={0xac, 0x14, 0x14, 0xc}, 0x4e21, 0x0, 0x6, 0x7, 0x108}}, 0x44) [ 160.754521] IPVS: ftp: loaded support on port[0] = 21 00:54:36 executing program 7 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x400000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) [ 160.877690] sd 0:0:1:0: device reset [ 160.903971] FAULT_INJECTION: forcing a failure. [ 160.903971] name failslab, interval 1, probability 0, space 0, times 0 [ 160.915263] CPU: 0 PID: 10950 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #137 [ 160.922642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.932006] Call Trace: [ 160.934614] dump_stack+0x1c9/0x2b4 [ 160.938249] ? dump_stack_print_info.cold.2+0x52/0x52 [ 160.943441] ? zap_class+0x740/0x740 [ 160.947168] should_fail.cold.4+0xa/0x1a [ 160.951239] ? trace_hardirqs_on+0x10/0x10 [ 160.955474] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 160.960589] ? find_held_lock+0x36/0x1c0 [ 160.964658] ? find_held_lock+0x36/0x1c0 [ 160.968730] ? check_same_owner+0x340/0x340 [ 160.973049] ? rcu_note_context_switch+0x730/0x730 [ 160.977987] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 160.983011] __should_failslab+0x124/0x180 [ 160.987246] should_failslab+0x9/0x14 [ 160.991042] kmem_cache_alloc+0x2af/0x760 [ 160.995192] __d_alloc+0xc8/0xd50 [ 160.998641] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 161.003648] ? do_raw_spin_unlock+0xa7/0x2f0 [ 161.008052] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 161.012642] ? __lock_is_held+0xb5/0x140 [ 161.016704] ? _raw_spin_unlock+0x22/0x30 [ 161.020841] ? __alloc_fd+0x34e/0x710 [ 161.024641] ? exit_files+0xb0/0xb0 [ 161.028264] d_alloc_pseudo+0x1d/0x30 [ 161.032088] __shmem_file_setup+0x1f3/0x700 [ 161.036399] ? check_same_owner+0x340/0x340 [ 161.040726] ? shmem_fill_super+0xa50/0xa50 [ 161.045059] ? get_unused_fd_flags+0x122/0x1a0 [ 161.049643] ? __alloc_fd+0x710/0x710 [ 161.053450] shmem_file_setup+0x2f/0x40 [ 161.057417] __x64_sys_memfd_create+0x2af/0x4f0 [ 161.062099] ? memfd_fcntl+0x1400/0x1400 [ 161.066155] ? do_syscall_64+0x9a/0x820 [ 161.070135] do_syscall_64+0x1b9/0x820 [ 161.074015] ? finish_task_switch+0x1d3/0x870 [ 161.078511] ? syscall_return_slowpath+0x5e0/0x5e0 [ 161.083441] ? syscall_return_slowpath+0x31d/0x5e0 [ 161.088369] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 161.093740] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 161.098584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 161.103762] RIP: 0033:0x455e29 [ 161.106938] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 161.126323] RSP: 002b:00007f408ee47a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 161.134036] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 161.141313] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 161.148572] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 161.155827] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 161.163084] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 00:54:37 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) 00:54:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) 00:54:37 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x3) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000080)={0x70, 0x7, 0x0, 0x3, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}]}) 00:54:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:37 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffff, 0x2000000}}, 0x200000d8) 00:54:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) 00:54:37 executing program 6 (fault-call:2 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 161.464925] FAULT_INJECTION: forcing a failure. [ 161.464925] name failslab, interval 1, probability 0, space 0, times 0 [ 161.476350] CPU: 1 PID: 10982 Comm: syz-executor6 Not tainted 4.18.0-rc3+ #137 [ 161.483720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.493084] Call Trace: [ 161.495691] dump_stack+0x1c9/0x2b4 [ 161.499336] ? dump_stack_print_info.cold.2+0x52/0x52 [ 161.504533] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 161.509372] should_fail.cold.4+0xa/0x1a [ 161.513425] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 161.518513] ? zap_class+0x740/0x740 [ 161.522217] ? perf_trace_lock+0xde/0x920 [ 161.526362] ? find_held_lock+0x36/0x1c0 [ 161.530424] ? check_same_owner+0x340/0x340 [ 161.534735] ? rcu_note_context_switch+0x730/0x730 [ 161.539661] ? do_raw_spin_unlock+0xa7/0x2f0 [ 161.544064] __should_failslab+0x124/0x180 [ 161.548290] should_failslab+0x9/0x14 [ 161.552088] __kmalloc+0x2c8/0x760 [ 161.555620] ? trace_hardirqs_on+0xd/0x10 [ 161.559765] ? __pm_runtime_resume+0x114/0x180 [ 161.564337] ? scsi_ioctl_reset+0x143/0x7e0 [ 161.568649] scsi_ioctl_reset+0x143/0x7e0 [ 161.572795] scsi_ioctl+0x46e/0xbe8 [ 161.576409] ? scsi_set_medium_removal+0x3a0/0x3a0 [ 161.581329] ? perf_trace_lock+0xde/0x920 [ 161.585477] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 161.590316] ? find_held_lock+0x36/0x1c0 [ 161.594371] sg_ioctl+0x104f/0x2fa0 [ 161.597999] ? _parse_integer+0x190/0x190 [ 161.602145] ? sg_new_write.isra.18+0x930/0x930 [ 161.606813] ? find_held_lock+0x36/0x1c0 [ 161.610877] ? lock_downgrade+0x8f0/0x8f0 [ 161.615021] ? rcu_is_watching+0x8c/0x150 [ 161.619158] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 161.623563] ? __fget+0x414/0x670 [ 161.627009] ? match_held_lock+0x821/0x8d0 [ 161.631237] ? expand_files.part.8+0x9c0/0x9c0 [ 161.635811] ? kasan_check_write+0x14/0x20 [ 161.640041] ? sg_new_write.isra.18+0x930/0x930 [ 161.644699] do_vfs_ioctl+0x1de/0x1720 [ 161.648579] ? ioctl_preallocate+0x300/0x300 [ 161.652972] ? __fget_light+0x2f7/0x440 [ 161.656934] ? fget_raw+0x20/0x20 [ 161.660389] ? __sb_end_write+0xac/0xe0 [ 161.664355] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 161.669890] ? fput+0x130/0x1a0 [ 161.673167] ? ksys_write+0x1ae/0x260 [ 161.676956] ? security_file_ioctl+0x94/0xc0 [ 161.681354] ksys_ioctl+0xa9/0xd0 [ 161.684799] __x64_sys_ioctl+0x73/0xb0 [ 161.688678] do_syscall_64+0x1b9/0x820 [ 161.692554] ? syscall_slow_exit_work+0x500/0x500 [ 161.697385] ? syscall_return_slowpath+0x5e0/0x5e0 [ 161.702304] ? syscall_return_slowpath+0x31d/0x5e0 [ 161.707227] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 161.712582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 161.717418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 161.722594] RIP: 0033:0x455e29 [ 161.725766] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 161.745060] RSP: 002b:00007f7a56c72c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 161.752758] RAX: ffffffffffffffda RBX: 00007f7a56c736d4 RCX: 0000000000455e29 00:54:37 executing program 5 (fault-call:3 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 161.760030] RDX: 0000000020000080 RSI: 0000000000002284 RDI: 0000000000000013 [ 161.767296] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 161.774550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 161.781815] R13: 00000000004bc8fb R14: 00000000004cad78 R15: 0000000000000000 00:54:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1, 0x800) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) capset(&(0x7f0000000040)={0x20080522, r1}, &(0x7f0000000080)={0x4, 0x9, 0x1, 0x7ff, 0xf8a5, 0x8}) 00:54:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) [ 161.928170] FAULT_INJECTION: forcing a failure. [ 161.928170] name failslab, interval 1, probability 0, space 0, times 0 [ 161.939516] CPU: 1 PID: 10993 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #137 [ 161.946888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.956251] Call Trace: [ 161.958858] dump_stack+0x1c9/0x2b4 [ 161.962514] ? dump_stack_print_info.cold.2+0x52/0x52 [ 161.967736] should_fail.cold.4+0xa/0x1a [ 161.971827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 161.976950] ? zap_class+0x740/0x740 [ 161.980702] ? find_held_lock+0x36/0x1c0 [ 161.984804] ? check_same_owner+0x340/0x340 [ 161.989145] ? rcu_note_context_switch+0x730/0x730 [ 161.994090] ? do_raw_spin_unlock+0xa7/0x2f0 [ 161.998529] __should_failslab+0x124/0x180 [ 162.002817] should_failslab+0x9/0x14 [ 162.006654] __kmalloc+0x2c8/0x760 [ 162.010210] ? trace_hardirqs_on+0xd/0x10 [ 162.014375] ? __pm_runtime_resume+0x114/0x180 [ 162.018976] ? scsi_ioctl_reset+0x143/0x7e0 [ 162.023322] scsi_ioctl_reset+0x143/0x7e0 [ 162.027497] scsi_ioctl+0x46e/0xbe8 [ 162.031142] ? scsi_set_medium_removal+0x3a0/0x3a0 [ 162.036108] ? perf_trace_lock+0xde/0x920 [ 162.040272] ? find_held_lock+0x36/0x1c0 [ 162.044362] sg_ioctl+0x104f/0x2fa0 [ 162.048008] ? _kstrtoull+0x188/0x250 [ 162.051825] ? _parse_integer+0x190/0x190 [ 162.055996] ? sg_new_write.isra.18+0x930/0x930 [ 162.060696] ? find_held_lock+0x36/0x1c0 [ 162.064796] ? lock_downgrade+0x8f0/0x8f0 [ 162.068990] ? rcu_is_watching+0x8c/0x150 [ 162.073150] ? rcu_report_qs_rnp+0x7a0/0x7a0 00:54:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:37 executing program 6 (fault-call:2 fault-nth:1): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) prctl$setmm(0x23, 0x4, &(0x7f0000ffd000/0x3000)=nil) 00:54:37 executing program 7 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 162.077581] ? __fget+0x414/0x670 [ 162.081054] ? match_held_lock+0x821/0x8d0 [ 162.085307] ? expand_files.part.8+0x9c0/0x9c0 [ 162.089932] ? kasan_check_write+0x14/0x20 [ 162.094189] ? sg_new_write.isra.18+0x930/0x930 [ 162.098870] do_vfs_ioctl+0x1de/0x1720 [ 162.102781] ? ioctl_preallocate+0x300/0x300 [ 162.107204] ? __fget_light+0x2f7/0x440 [ 162.111191] ? fget_raw+0x20/0x20 [ 162.114718] ? __sb_end_write+0xac/0xe0 [ 162.118707] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 162.124258] ? fput+0x130/0x1a0 00:54:37 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 162.127545] ? ksys_write+0x1ae/0x260 [ 162.131357] ? security_file_ioctl+0x94/0xc0 [ 162.135780] ksys_ioctl+0xa9/0xd0 [ 162.139246] __x64_sys_ioctl+0x73/0xb0 [ 162.143150] do_syscall_64+0x1b9/0x820 [ 162.147054] ? finish_task_switch+0x1d3/0x870 [ 162.152257] ? syscall_return_slowpath+0x5e0/0x5e0 [ 162.157200] ? syscall_return_slowpath+0x31d/0x5e0 [ 162.162158] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 162.167528] FAULT_INJECTION: forcing a failure. [ 162.167528] name failslab, interval 1, probability 0, space 0, times 0 [ 162.167561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 162.183689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.188881] RIP: 0033:0x455e29 [ 162.192060] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.211410] RSP: 002b:00007f36f0414c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 162.219114] RAX: ffffffffffffffda RBX: 00007f36f04156d4 RCX: 0000000000455e29 [ 162.226377] RDX: 0000000020000080 RSI: 0000000000002284 RDI: 0000000000000013 [ 162.233639] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 162.240899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 162.248158] R13: 00000000004bc8fb R14: 00000000004cad78 R15: 0000000000000000 [ 162.255459] CPU: 0 PID: 11012 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #137 [ 162.262825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.272207] Call Trace: [ 162.274813] dump_stack+0x1c9/0x2b4 [ 162.278459] ? dump_stack_print_info.cold.2+0x52/0x52 [ 162.283669] ? __kernel_text_address+0xd/0x40 [ 162.288195] should_fail.cold.4+0xa/0x1a [ 162.292275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 162.297397] ? save_stack+0xa9/0xd0 [ 162.301040] ? save_stack+0x43/0xd0 [ 162.304682] ? kasan_kmalloc+0xc4/0xe0 [ 162.308593] ? kmem_cache_alloc+0x12e/0x760 [ 162.312948] ? __d_alloc+0xc8/0xd50 [ 162.316574] ? d_alloc_pseudo+0x1d/0x30 [ 162.320542] ? __shmem_file_setup+0x1f3/0x700 [ 162.325039] ? shmem_file_setup+0x2f/0x40 [ 162.329207] ? find_held_lock+0x36/0x1c0 [ 162.333276] ? check_same_owner+0x340/0x340 [ 162.337591] ? rcu_note_context_switch+0x730/0x730 [ 162.342525] ? kasan_check_read+0x11/0x20 [ 162.346665] __should_failslab+0x124/0x180 [ 162.350893] should_failslab+0x9/0x14 [ 162.354690] kmem_cache_alloc+0x2af/0x760 [ 162.358833] ? rcu_read_lock_sched_held+0x108/0x120 [ 162.363838] ? kmem_cache_alloc+0x5fa/0x760 [ 162.368154] ? shmem_destroy_callback+0xc0/0xc0 [ 162.372813] shmem_alloc_inode+0x1b/0x40 [ 162.376874] alloc_inode+0x63/0x190 [ 162.380494] new_inode_pseudo+0x71/0x1a0 [ 162.384547] ? prune_icache_sb+0x1b0/0x1b0 [ 162.388786] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 162.393794] new_inode+0x1c/0x40 [ 162.397149] shmem_get_inode+0xf1/0x910 [ 162.401127] ? shmem_encode_fh+0x340/0x340 [ 162.405354] ? _raw_spin_unlock+0x22/0x30 [ 162.409498] ? __alloc_fd+0x34e/0x710 [ 162.413294] ? exit_files+0xb0/0xb0 [ 162.416918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 162.422459] __shmem_file_setup+0x259/0x700 [ 162.426771] ? check_same_owner+0x340/0x340 [ 162.431084] ? shmem_fill_super+0xa50/0xa50 [ 162.435409] ? get_unused_fd_flags+0x122/0x1a0 [ 162.439980] ? __alloc_fd+0x710/0x710 [ 162.443787] shmem_file_setup+0x2f/0x40 [ 162.447753] __x64_sys_memfd_create+0x2af/0x4f0 [ 162.452412] ? memfd_fcntl+0x1400/0x1400 [ 162.456469] ? do_syscall_64+0x9a/0x820 [ 162.460438] do_syscall_64+0x1b9/0x820 [ 162.464313] ? finish_task_switch+0x1d3/0x870 [ 162.468797] ? syscall_return_slowpath+0x5e0/0x5e0 [ 162.473731] ? syscall_return_slowpath+0x31d/0x5e0 [ 162.478656] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 162.484047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 162.488889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.494066] RIP: 0033:0x455e29 [ 162.497249] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.516590] RSP: 002b:00007f408ee47a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:54:38 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x401, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000380)=0xfcf) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x3e5, 0xa724, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8000000000000007}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000280)=""/60, 0x3c, 0x80000001, &(0x7f0000000340)={r1, r2+30000000}) r3 = semget(0x3, 0x1, 0x240) semctl$SEM_INFO(r3, 0x7, 0x13, &(0x7f0000000040)=""/132) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x6, 0x40000) r5 = getpid() ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000200)={[], 0x4, 0x1, 0x0, 0x7, 0x20, r5}) [ 162.524289] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 162.531547] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 162.538804] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 162.546062] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 162.553317] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 00:54:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 162.636569] IPVS: ftp: loaded support on port[0] = 21 [ 162.643860] QAT: Invalid ioctl [ 162.692264] QAT: Invalid ioctl 00:54:38 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:38 executing program 5 (fault-call:3 fault-nth:1): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:38 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xc25dd0) 00:54:38 executing program 7 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:38 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2203, &(0x7f0000000080)) 00:54:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x401, 0x400000) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000440)=ANY=[@ANYBLOB="57003f00e18e09000000b600ef00936206000080000099090300e7092e1a80da62d86309384344677bd7c04ea5c873a814b066d0d4c603c0269c9bc966d30dc557477186a05466bf997f3a05ded0ffe217f5bb71a83fcbf90b5f00dd2b207df8f5121ae6fe8fff7afdeb51bbd6922fd9625e0b386e1251241b46ec4f2d31d3ae7862c1ecf2bfe55d3ec64777e1f0ccf261c8046b96a6afb38607ee6bd3ebfb305986c502871fd9ccdaaf0e656bc602098c1402dd988c50a8a1b950f07be4e383cfe67c633df0c4c9a6851b3f7b1a2e945dd6"]) r2 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28001) accept4$inet6(r0, 0x0, &(0x7f0000000200), 0x800) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000140)) write$evdev(r2, &(0x7f00000000c0)=[{{0x77359400}, 0x1, 0x52, 0x2}, {{0x77359400}}], 0x30) clock_nanosleep(0x1, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 162.902831] FAULT_INJECTION: forcing a failure. [ 162.902831] name failslab, interval 1, probability 0, space 0, times 0 [ 162.914207] CPU: 1 PID: 11054 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #137 [ 162.921576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.930939] Call Trace: [ 162.933553] dump_stack+0x1c9/0x2b4 [ 162.937200] ? dump_stack_print_info.cold.2+0x52/0x52 [ 162.942439] ? __lock_acquire+0x7fc/0x5020 [ 162.946703] should_fail.cold.4+0xa/0x1a [ 162.950792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 162.955932] ? find_held_lock+0x36/0x1c0 [ 162.960028] ? graph_lock+0x170/0x170 [ 162.963860] ? find_held_lock+0x36/0x1c0 [ 162.967961] ? check_same_owner+0x340/0x340 [ 162.972299] ? graph_lock+0x170/0x170 [ 162.976116] ? rcu_note_context_switch+0x730/0x730 [ 162.981089] ? kasan_check_read+0x11/0x20 [ 162.985287] __should_failslab+0x124/0x180 [ 162.989553] should_failslab+0x9/0x14 [ 162.993382] kmem_cache_alloc+0x2af/0x760 [ 162.997553] ? find_held_lock+0x36/0x1c0 [ 163.001635] get_empty_filp+0x12d/0x530 [ 163.005612] ? proc_nr_files+0x60/0x60 [ 163.009523] ? kasan_check_read+0x11/0x20 [ 163.013667] ? do_raw_spin_unlock+0xa7/0x2f0 [ 163.018091] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 163.022669] ? kasan_check_write+0x14/0x20 [ 163.026892] ? do_raw_spin_lock+0xc1/0x200 [ 163.031136] alloc_file+0x24/0x3e0 [ 163.034667] ? clear_nlink.part.9+0x65/0x80 [ 163.038991] __shmem_file_setup+0x313/0x700 [ 163.043308] ? check_same_owner+0x340/0x340 [ 163.047626] ? shmem_fill_super+0xa50/0xa50 [ 163.051940] ? get_unused_fd_flags+0x122/0x1a0 [ 163.056512] ? __alloc_fd+0x710/0x710 [ 163.060309] shmem_file_setup+0x2f/0x40 [ 163.064274] __x64_sys_memfd_create+0x2af/0x4f0 [ 163.068932] ? memfd_fcntl+0x1400/0x1400 [ 163.072993] ? do_syscall_64+0x9a/0x820 [ 163.076965] do_syscall_64+0x1b9/0x820 [ 163.080850] ? finish_task_switch+0x1d3/0x870 [ 163.085340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 163.090615] ? syscall_return_slowpath+0x31d/0x5e0 [ 163.095554] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 163.100914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 163.105754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.110930] RIP: 0033:0x455e29 [ 163.114104] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.133447] RSP: 002b:00007f408ee47a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 163.141149] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 163.148412] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 163.155670] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 163.162928] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 163.170187] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 [ 163.220703] sd 0:0:1:0: device reset [ 163.244473] FAULT_INJECTION: forcing a failure. [ 163.244473] name failslab, interval 1, probability 0, space 0, times 0 [ 163.255868] CPU: 1 PID: 11064 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #137 [ 163.263234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.272595] Call Trace: [ 163.275205] dump_stack+0x1c9/0x2b4 [ 163.278861] ? dump_stack_print_info.cold.2+0x52/0x52 [ 163.284072] ? do_raw_spin_unlock+0xa7/0x2f0 [ 163.288503] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 163.293126] should_fail.cold.4+0xa/0x1a [ 163.297302] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 163.302435] ? finish_task_switch+0x1d3/0x870 [ 163.306957] ? preempt_notifier_register+0x200/0x200 [ 163.312085] ? lock_repin_lock+0x430/0x430 [ 163.316355] ? __schedule+0x884/0x1ed0 [ 163.320272] ? __sched_text_start+0x8/0x8 [ 163.324441] ? set_precision+0xe0/0xe0 [ 163.328363] __should_failslab+0x124/0x180 [ 163.331509] IPVS: ftp: loaded support on port[0] = 21 [ 163.332614] should_failslab+0x9/0x14 [ 163.332634] kmem_cache_alloc+0x47/0x760 [ 163.332662] ? mempool_free+0x370/0x370 [ 163.349686] mempool_alloc_slab+0x44/0x60 [ 163.353849] mempool_alloc+0x193/0x4b0 [ 163.357756] ? mempool_destroy+0x30/0x30 [ 163.361838] ? kasan_check_read+0x11/0x20 [ 163.366004] ? do_raw_spin_unlock+0xa7/0x2f0 [ 163.370428] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 163.375031] virtscsi_device_reset+0x89/0x350 [ 163.379535] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 163.384737] scsi_ioctl_reset+0x5b7/0x7e0 [ 163.388895] ? virtscsi_complete_cmd+0x740/0x740 00:54:39 executing program 7 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:39 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2288, &(0x7f0000000080)) 00:54:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 163.393672] scsi_ioctl+0x46e/0xbe8 [ 163.397318] ? scsi_set_medium_removal+0x3a0/0x3a0 [ 163.402263] ? perf_trace_lock+0xde/0x920 [ 163.406433] ? find_held_lock+0x36/0x1c0 [ 163.410521] sg_ioctl+0x104f/0x2fa0 [ 163.414161] ? _kstrtoull+0x188/0x250 [ 163.417977] ? _parse_integer+0x190/0x190 [ 163.422144] ? sg_new_write.isra.18+0x930/0x930 [ 163.426838] ? find_held_lock+0x36/0x1c0 [ 163.430927] ? lock_downgrade+0x8f0/0x8f0 [ 163.435095] ? rcu_is_watching+0x8c/0x150 [ 163.438228] FAULT_INJECTION: forcing a failure. [ 163.438228] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 163.439251] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 163.439277] ? __fget+0x414/0x670 [ 163.439298] ? match_held_lock+0x821/0x8d0 [ 163.439312] ? expand_files.part.8+0x9c0/0x9c0 [ 163.439339] ? kasan_check_write+0x14/0x20 [ 163.472140] ? sg_new_write.isra.18+0x930/0x930 [ 163.476808] do_vfs_ioctl+0x1de/0x1720 [ 163.480696] ? ioctl_preallocate+0x300/0x300 [ 163.485100] ? __fget_light+0x2f7/0x440 [ 163.489080] ? fget_raw+0x20/0x20 [ 163.492535] ? __sb_end_write+0xac/0xe0 [ 163.496514] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 163.502049] ? fput+0x130/0x1a0 [ 163.505417] ? ksys_write+0x1ae/0x260 [ 163.509222] ? security_file_ioctl+0x94/0xc0 [ 163.513636] ksys_ioctl+0xa9/0xd0 [ 163.517088] __x64_sys_ioctl+0x73/0xb0 [ 163.520989] do_syscall_64+0x1b9/0x820 [ 163.524871] ? finish_task_switch+0x1d3/0x870 [ 163.529368] ? syscall_return_slowpath+0x5e0/0x5e0 [ 163.534295] ? syscall_return_slowpath+0x31d/0x5e0 [ 163.539228] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 163.544594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 163.549442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.554627] RIP: 0033:0x455e29 [ 163.557811] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.577176] RSP: 002b:00007f36f0414c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.584888] RAX: ffffffffffffffda RBX: 00007f36f04156d4 RCX: 0000000000455e29 [ 163.592152] RDX: 0000000020000080 RSI: 0000000000002284 RDI: 0000000000000013 [ 163.599502] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 163.606764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 163.614026] R13: 00000000004bc8fb R14: 00000000004cad78 R15: 0000000000000001 [ 163.621308] CPU: 0 PID: 11075 Comm: syz-executor7 Not tainted 4.18.0-rc3+ #137 [ 163.628676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.638031] Call Trace: [ 163.640631] dump_stack+0x1c9/0x2b4 [ 163.644273] ? dump_stack_print_info.cold.2+0x52/0x52 [ 163.649473] ? zap_class+0x740/0x740 [ 163.653204] should_fail.cold.4+0xa/0x1a [ 163.657278] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 163.662395] ? graph_lock+0x170/0x170 [ 163.666208] ? find_held_lock+0x36/0x1c0 [ 163.670280] ? find_held_lock+0x36/0x1c0 [ 163.674353] ? __lock_is_held+0xb5/0x140 [ 163.678428] ? check_same_owner+0x340/0x340 [ 163.682763] ? rcu_note_context_switch+0x730/0x730 [ 163.687710] __alloc_pages_nodemask+0x36e/0xdb0 [ 163.692382] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 163.697390] ? trace_hardirqs_on+0x10/0x10 [ 163.701619] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 163.706627] ? percpu_counter_add_batch+0xf2/0x150 [ 163.711546] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 163.716548] ? __vm_enough_memory+0x590/0x980 [ 163.721039] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 163.726563] alloc_pages_vma+0xdd/0x540 [ 163.730527] shmem_alloc_page+0xa8/0x190 [ 163.734575] ? shmem_swapin+0x230/0x230 [ 163.738572] shmem_alloc_and_acct_page+0x1f1/0x820 [ 163.743492] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 163.748150] ? update_load_avg+0x2de/0x2590 [ 163.752467] shmem_getpage_gfp+0x6ea/0x41e0 [ 163.756773] ? __lock_acquire+0x7fc/0x5020 [ 163.761005] ? print_usage_bug+0xc0/0xc0 [ 163.765069] ? shmem_writepage+0x1380/0x1380 [ 163.769473] ? print_usage_bug+0xc0/0xc0 [ 163.773529] ? rcu_read_lock_sched_held+0x108/0x120 [ 163.778529] ? print_usage_bug+0xc0/0xc0 [ 163.782572] ? tg_unthrottle_up+0x220/0x220 [ 163.787142] ? print_usage_bug+0xc0/0xc0 [ 163.791199] ? __lock_acquire+0x7fc/0x5020 [ 163.795422] ? print_usage_bug+0xc0/0xc0 [ 163.799467] ? __lock_acquire+0x7fc/0x5020 [ 163.803694] ? check_noncircular+0x20/0x20 [ 163.807928] ? __lock_acquire+0x7fc/0x5020 [ 163.812154] ? __lock_acquire+0x7fc/0x5020 [ 163.816389] ? trace_hardirqs_on+0x10/0x10 [ 163.820611] ? print_usage_bug+0xc0/0xc0 [ 163.824655] ? zap_class+0x740/0x740 [ 163.828355] ? perf_trace_lock+0xde/0x920 [ 163.832490] ? print_usage_bug+0xc0/0xc0 [ 163.836536] ? zap_class+0x740/0x740 [ 163.840238] ? perf_trace_lock+0xde/0x920 [ 163.844377] ? zap_class+0x740/0x740 [ 163.848079] ? zap_class+0x740/0x740 [ 163.851784] ? graph_lock+0x170/0x170 [ 163.855577] ? find_held_lock+0x36/0x1c0 [ 163.859627] ? print_usage_bug+0xc0/0xc0 [ 163.863678] ? lock_downgrade+0x8f0/0x8f0 [ 163.867813] ? kasan_check_read+0x11/0x20 [ 163.872507] ? lock_release+0xa30/0xa30 [ 163.876646] ? mark_held_locks+0xc9/0x160 [ 163.880781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 163.886304] ? iov_iter_fault_in_readable+0x23d/0x460 [ 163.891481] ? copy_page_from_iter+0x890/0x890 [ 163.896050] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 163.901573] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 163.906763] shmem_write_begin+0x110/0x1e0 [ 163.910989] generic_perform_write+0x3ae/0x6c0 [ 163.915569] ? add_page_wait_queue+0x2c0/0x2c0 [ 163.920137] ? file_update_time+0xe4/0x640 [ 163.924360] ? current_time+0x1b0/0x1b0 [ 163.928327] ? down_write+0x8f/0x130 [ 163.932038] __generic_file_write_iter+0x26e/0x630 [ 163.936959] generic_file_write_iter+0x438/0x870 [ 163.941706] ? __generic_file_write_iter+0x630/0x630 [ 163.946802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 163.952325] ? iov_iter_init+0xc9/0x1f0 [ 163.956296] __vfs_write+0x6c6/0x9f0 [ 163.960016] ? kernel_read+0x120/0x120 [ 163.963904] ? __lock_is_held+0xb5/0x140 [ 163.967961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 163.973483] ? __sb_start_write+0x17f/0x300 [ 163.977792] vfs_write+0x1f8/0x560 [ 163.981319] ksys_pwrite64+0x181/0x1b0 [ 163.985202] ? __ia32_sys_pread64+0xf0/0xf0 [ 163.989516] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 163.995039] ? fput+0x130/0x1a0 [ 163.998307] ? do_sys_ftruncate+0x44e/0x560 [ 164.002624] __x64_sys_pwrite64+0x97/0xf0 [ 164.006759] do_syscall_64+0x1b9/0x820 [ 164.010641] ? finish_task_switch+0x1d3/0x870 [ 164.015125] ? syscall_return_slowpath+0x5e0/0x5e0 [ 164.020047] ? syscall_return_slowpath+0x31d/0x5e0 [ 164.024972] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 164.030334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 164.035167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.040342] RIP: 0033:0x4100e7 [ 164.043520] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 164.062786] RSP: 002b:00007f408ee47a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 164.070495] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004100e7 [ 164.077761] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000014 [ 164.085029] RBP: 0000000000000000 R08: 0000000020000418 R09: 00000000fbad8001 00:54:39 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x549840) [ 164.092370] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 164.099640] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000004 00:54:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000240)) 00:54:40 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5460, &(0x7f0000000080)) 00:54:40 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:40 executing program 5 (fault-call:3 fault-nth:2): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0xfffffffffffff800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x454c, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000040)) pipe(&(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:40 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x62b1a0) 00:54:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:40 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5, &(0x7f0000000080)) [ 164.442066] sd 0:0:1:0: device reset 00:54:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:40 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x40049409, &(0x7f0000000080)) 00:54:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:40 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) [ 164.697673] IPVS: ftp: loaded support on port[0] = 21 [ 164.716365] sd 0:0:1:0: device reset 00:54:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x6, 0x1, &(0x7f0000000040), &(0x7f0000000400)) 00:54:40 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:41 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5381, &(0x7f0000000080)) 00:54:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x73d070) 00:54:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5381, &(0x7f0000000080)) 00:54:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000000c0)=0xc) ptrace$getenv(0x4201, r0, 0x8000, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000000)) 00:54:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x40049409, &(0x7f0000000080)) 00:54:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2201, &(0x7f0000000080)) 00:54:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) [ 165.472072] IPVS: ftp: loaded support on port[0] = 21 00:54:41 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x223da0) 00:54:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5386, &(0x7f0000000080)) 00:54:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2288, &(0x7f0000000080)) 00:54:41 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x684000) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000140)='ip_vti0\x00') setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x4, 0x3, 0x8ed9}, {0x0, 0x40, 0xfdce, 0x800}, {0x4, 0x0, 0x7, 0x1}, {0x1, 0x2, 0x80, 0x200}, {0x3, 0x6, 0x0, 0x66}]}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:54:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2283, &(0x7f0000000080)) 00:54:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:41 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2272, &(0x7f0000000080)) 00:54:41 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x356010) 00:54:42 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227e, &(0x7f0000000080)) 00:54:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2286, &(0x7f0000000080)) 00:54:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x88000, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000100)=0x2a9c, 0x8) r1 = semget$private(0x0, 0x0, 0x0) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000140)=""/2) 00:54:42 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x991380) [ 166.406760] IPVS: ftp: loaded support on port[0] = 21 00:54:42 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5452, &(0x7f0000000080)) 00:54:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:42 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xcf4, 0x40000) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000080)) 00:54:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1267, &(0x7f0000000080)) 00:54:42 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2283, &(0x7f0000000080)) 00:54:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:42 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x2b4df0) 00:54:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:43 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5451, &(0x7f0000000080)) 00:54:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5452, &(0x7f0000000080)) [ 167.287729] IPVS: ftp: loaded support on port[0] = 21 00:54:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)) clock_nanosleep(0x6, 0x0, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) nanosleep(&(0x7f00000000c0)={r2, r3+30000000}, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={r0, r1+30000000}, &(0x7f0000000400)) 00:54:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:43 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x5fac30) 00:54:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:44 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0481273, &(0x7f0000000080)) 00:54:44 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc020660b, &(0x7f0000000080)) 00:54:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:44 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x940a70) 00:54:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2, &(0x7f0000000080)) 00:54:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:44 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x4020940d, &(0x7f0000000080)) 00:54:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) [ 168.534189] IPVS: ftp: loaded support on port[0] = 21 00:54:44 executing program 1: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200001, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0xfffffffffffffdc0, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, r0, 0x0) 00:54:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:44 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2203, &(0x7f0000000080)) 00:54:44 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2271, &(0x7f0000000080)) 00:54:45 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000080)={0x40000000002, 0x70, 0x3e5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r2 = dup2(r1, r1) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0x4000000, 0xa0c, 0x1ff, 0x62e, 0x3f, 0x5, 0xfff, 0x2b, 0x8, 0x5}) 00:54:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5421, &(0x7f0000000080)) 00:54:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xd27ad0) 00:54:45 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5385, &(0x7f0000000080)) 00:54:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227b, &(0x7f0000000080)) 00:54:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x40, 0xfff, 0x2, 0x8001, 0x8}, 0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0}, &(0x7f0000000880)=0xc) sendmsg$netlink(r0, &(0x7f0000001fc0)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001f80)=[{&(0x7f0000000440)={0x228, 0x14, 0x0, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x4, 0x5}, @nested={0x214, 0x8d, [@generic="939c829d899090b0c16ecd8a10198a1b96411f40e8acd5b423aafee339f9bdd743a40f6648ee7d62fd7af778a5b46bba0fb170c7e5c9cfb10b87cc151799b2864bb4f9d8d07153f92a951cfa59dfc6723634a7a015a21013efb8b2336df3309236b909c464c7497e1395aa7f72bb7010bc7212dc0b9fdd69946654c8a858684805c72d6add3d9a199dbb55edfd22440b281ca2115abe3e9d5680b36abbdc90b369544c2572cd17e04c095f2db60e6114faa034c2ea5806029ee7161acca254f96cbb67fe2f20322c76cf58b8e4fcf2ab1eb5648ccf5aa587b1754a97b4db1b265655f5775e1990", @generic="dd4b5259afa0937808c393393117d407ad3fbff8080a2fecc4e5a9a11b6855483c015aa8e7da354ec9b0517723c1e6551eb6cc4156a6ecde803e5530c417041bd3d02158ae309c954feb2b9bb1de36ef9b18b894a5d2e2080ce53754c35b52df36d57dbdd2dff609e21340f165b6b8e24e58daeb209f0a493eea9087a3f79be0fef999ee8b4ed875013f9f5b0ad0df6871f1b9f35f7c9e6f2677669bfd71c7660fe1a251eae7c63afd3f21df1b51ffa2bba47deb", @typed={0x8, 0x345, @uid=r1}, @typed={0xc, 0x3e, @u64=0x1}, @generic="a0a51530983448d7baa789b82b8c94b4e8ec42f3caaa87a8d4637f791226b39d40c19f916512847e8b3b517e6f84a3233100484a526139d76b1e8d011a3872cc9e5fd486fab15ed14445d606933afa2c31e83f84faa4d7c5fa0f50116c67752eca"]}]}, 0x228}, {&(0x7f0000000380)={0x14, 0x34, 0x10, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x4, 0x44}]}, 0x14}, {&(0x7f0000000680)={0x1a4, 0x38, 0x0, 0x70bd26, 0x25dfdbff, "", [@typed={0xc, 0x62, @u64=0x7f}, @typed={0x8, 0x7d, @ipv4=@rand_addr=0x6}, @generic="7b55d7359cc013ceb175d945e61c9d1484445e016cd1f94933496cdd35d114644661556a650346", @nested={0x14, 0x5f, [@typed={0x10, 0x2, @str='/dev/cuse\x00'}]}, @typed={0x8, 0x67, @u32=0x1}, @generic="2ca8a5", @generic="b4b156fa4700316700085c3f1f5b0ac68f08e965346da8455e8eddb8f15fe0847e4458f4eaa050550020ed85eb305614a42d349d8ef5", @nested={0x104, 0x11, [@typed={0x4, 0x2d}, @typed={0x8, 0x65, @ipv4=@multicast1=0xe0000001}, @generic="32737d5db0cb65721b44eb801c73285c9c36d2bcd566ae1bcc65a7768c7c04e5221a1ea8a147cddab4452a", @generic="91897c433c39a1c80bf3966169df575c7d40e2756ae590a186626542d308e5dffbf4f7e6ef99ab4bf790773af46e6004929fe82e69f9e44e35ce3e7fd353c0162b912835747800a4e3684babbc8ad0d64007be33caad53d2af2de06642e669bba11b6c06ccbf951e54c975d3bd1b72160fcb5e9daed0e2ac6aa45c50cf2c626d1db173bfd1269177345f0de4e732a0efae86e100af70e290b6bf12b1d2ecf15da976e5bde0200ca81ab7560fd2b5850477cc6508589f804ce27545d349ce262900fee2d6b3b555"]}]}, 0x1a4}, {&(0x7f00000008c0)={0x1690, 0x37, 0x300, 0x70bd26, 0x25dfdbfc, "", [@generic="88a31b8c35d27eacffc7bbc4d4d70dd97bb92b3a2d713ddbd62967f0243cdc41f90b9c85aff2889e57838c934da5093d3abe45196928d7d91372eccc86aa6f45c28a5125151a6e748487f4c34e3d972b98524426550aefde70bc3727c9ec89b3b148e5ec7724633e50179595e6dd06", @typed={0x70, 0x5a, @binary="be0419a2a315bdb0700327c3ebf24c1d71e4438d83d8addfff52bf1f085fdac42926bae206646f1f80a13bb303ce11d3556bef79a131072e1b7b0ccde358f564f6d238fa1cc259bf83bd2d613f50eb5e9ff837adc7fe0be6eb5489fd0599929a1b215e6d35054f569c99d8"}, @generic="8a7c5fb28b133f4a3ce3d3e3e945b9866ad0eb169de2e81964c0307db842a3176f5e23dc51b3b3e097062d", @nested={0x1ac, 0x86, [@generic="07b057b92fe598650a002692c31d7b35f189ca541fd974deec671550bf7a37c7085e0053ebf9e4030c87ef4a7d520fe1610675d2428942ca10bb5ab199b4ecb2f8fef9bab2d20fd4008bdbe0c910b96367f772ded03eb6ecba9454ce36afe9faf326fcb52ab06d4c7f590b68fb608b7b07e6e9c6964ffe1bbbd2e1e5c9bddbd305becc1b3f03e45f0836c9d4a9775b88208638c3df97cdcddc394289d3fa4e58c54ced91fef1bc148b1623a3b8c88266db82", @typed={0xc, 0x7b, @u64=0x992e}, @generic="0264555ba247637cc88b02ca86d47bb80ab6896ec3fcb10ed7e7eb2024326f83c2917026b935dbb37bcd5cf499ec51b18e262e2760f88f6bccf70809c3b24d8b32fdf4e4d646ec26410c61f8dbf925e058e69647e1b4dce7", @typed={0x8, 0x3, @u32=0x10000}, @typed={0xc, 0x59, @u64=0x66a}, @generic="93aaa5c1364292cb802e88a78e686c2338262bf0aee6fe687cff1ca552b26f047c22d058dd0d6f4727a2733fed23b9393f65de028a81be6c2692126aa54e06590bffe004c383a3b0952f2361e9742549e422262ee1541b405d92c0322b0dd00672b0e742d51de571ce2966da5713eb9b1f42810a8ea0b50d81e1a8d26b"]}, @nested={0x12e0, 0x63, [@generic="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", @typed={0x8, 0x68, @u32=0x5}, @typed={0x8, 0x47, @u32=0x80000001}, @typed={0x14, 0x34, @ipv6=@dev={0xfe, 0x80, [], 0xe}}, @generic="7816daa12bdffec4db11e73a03c717f2bce84bfdfc2d5e65a365ef789a3f92fd570d42ad406879c2030e9ab4b450a667b0428501bf19ff26ce472a0ad19af05187b7363de8c085083d68e6e8f2d069b7d9da83208a6fd8e0a560de9a0039cc63ac6768799d468f59fea975796c9fef26f1916c8dec4984804d6b7d046529432ee8e3971a81514405f8300aa60295615a83f7568838d4d643da835e434cbef9656c0277fb20fe94918e4693476c1744fd5295cc1ff1cc9ae19325f36e22dc573d5360674a196baed08221c1d9d892b06249455a89dd0594e19272104b7fdb05bd6e40", @typed={0xd4, 0x95, @binary="0c8ee0830da635d16723a90de06769c20c449c735b91c385dad51f002845938e977dab5cfe3955377128e735968a93be050fd312180947662271a80449485ee12a9b96d904bf3beebcc452d05080d5d281d96d34db2c5f905b6ff50c1af4567fadf64c3645ab9addf5f7dc60f9489c9bb1ecfed7b12f34655b02ceff5b54b9803d2724132ed529e62a92b76753609bedf44883f74186274994f87040cd90c523f514aee0570ad16f563a821f6223cec84b8580a755ce589add1f7467d77acbf3e13e173c8de53e693a61e150b7bc45fc"}, @typed={0x8, 0x86, @ipv4=@dev={0xac, 0x14, 0x14, 0x1b}}, @typed={0x10, 0x28, @str='/dev/cuse\x00'}, @generic="3c2c84133e85791c90c21895b657d6e55632699c9b8e7547ea7eba49e17d787e980fc066eb6cadcbad0aff59a981fd3754a84137c6264de3e20aba170f58cdaddd0855684b1f5f499af989f7accd622bb87b78d627437d98ff0f282b4e51ddbb82b8b6e5c5a3f773cb3882e63610e1443c487b7ad405e421e8b6d7709a8327789be2c29c62260d26d7708a98a1d008c49afc0fb38e6ed549d4ae5c92cbff67bd78f5934c7e943467c06f3da3a92ea0511c08b04254a48b08f9019f2770623f9a4b9e2ab6747dcce51d3fcb567794a3690854f33880245f04c8e03e317a837f5202d8b497568da67fb6"]}, @typed={0x8, 0x20, @uid=r2}, @generic="2ed8b4fc129712dc89e78bd9271a4345fb9eaca08f3ec2e66ec27dd0a4c997efd891da3529a3f162020791ec430a7d4fda70c30cc6042604643d0179ea9ed79a3b3da7f0a6768498741a87b52efc7568e792798e86b69b06ca9565bad378fe1ed83f40727638577d9396841f22d103e69389c44275f688c273a5260519010aea09e01dc2aba50a87bf707840b3ab3bb145ba8450be2f715a1a0d820b602ca8fcc189069e4f2ebb15c26280ed531b157f037403b106d7d6bee8146e3927fc5dfa67fcfef1d1f1da311bc1d966355992fb96666e5a8fa11ed8acc0b31190b81dc1"]}, 0x1690}], 0x4, 0x0, 0x0, 0x20000000}, 0x40000) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) timerfd_create(0x2, 0x800) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x10000, 0x0) ioctl$KDDISABIO(r3, 0x4b37) 00:54:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000080)) 00:54:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 169.487524] IPVS: ftp: loaded support on port[0] = 21 00:54:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2270, &(0x7f0000000080)) 00:54:45 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:45 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0189436, &(0x7f0000000080)) 00:54:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x3, 0x6, @random="62e3b94ad9d9"}, 0x14) 00:54:45 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xcd71c0) 00:54:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:45 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227f, &(0x7f0000000080)) 00:54:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:46 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x6, &(0x7f0000000080)) 00:54:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1274, &(0x7f0000000080)) 00:54:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={r0, r1+30000000}, &(0x7f0000000400)) [ 170.409193] IPVS: ftp: loaded support on port[0] = 21 00:54:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:46 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227c, &(0x7f0000000080)) 00:54:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2270, &(0x7f0000000080)) 00:54:46 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:46 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x3763b0) 00:54:46 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5421, &(0x7f0000000080)) 00:54:46 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5380, &(0x7f0000000080)) 00:54:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5450, &(0x7f0000000080)) 00:54:47 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2, &(0x7f0000000080)) 00:54:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) [ 171.298598] IPVS: ftp: loaded support on port[0] = 21 00:54:47 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000000c0)={0xfee3, 0x3ff, 0x1, {}, 0x67e, 0xf872}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x7, 0x1, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000040)) 00:54:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0045878, &(0x7f0000000080)) 00:54:47 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x9a1550) 00:54:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1267, &(0x7f0000000080)) 00:54:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x3, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) 00:54:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227a, &(0x7f0000000080)) 00:54:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000100)=""/85) 00:54:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227b, &(0x7f0000000080)) [ 171.907515] IPVS: ftp: loaded support on port[0] = 21 00:54:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5385, &(0x7f0000000080)) 00:54:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000100)={0x6, 0x70, 0x10001, 0xb92, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x1, 0xa, 0xcd, 0x5, 0xfff, 0x3, 0x1, 0x3, 0x6, 0x7, 0x644b, 0x2, 0x0, 0x3f, 0x2, 0x400, 0x80, 0x1, 0x5, 0x5, 0x100, 0xfffffffffffffffb, 0x1, 0x100000001, 0x80000001, 0x2, 0x2, 0x20, 0x8, 0x0, 0x0, 0x10001, 0x3, @perf_config_ext={0xffff, 0xff}, 0x8, 0x8b32, 0x800000, 0x7, 0x8001, 0x5, 0x7fff}, r3, 0x9, r0, 0x1) setitimer(0x1, &(0x7f0000000080)={{r1, r2/1000+10000}, {0x0, 0x2710}}, &(0x7f00000000c0)) 00:54:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:47 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x4a8620) 00:54:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:48 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:48 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5387, &(0x7f0000000080)) 00:54:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x4020940d, &(0x7f0000000080)) 00:54:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x10001, 0x20) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7, 0x7b, 0x2}, 0x7) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000000c0)={0x4, 0x0, [{}, {}, {}, {}]}) 00:54:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227c, &(0x7f0000000080)) 00:54:48 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2275, &(0x7f0000000080)) 00:54:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:48 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x66b8e0) 00:54:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x7, 0x80002) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10b080, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)={0x2, [0x0, 0x0]}) 00:54:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5460, &(0x7f0000000080)) 00:54:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:48 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2286, &(0x7f0000000080)) [ 172.688511] IPVS: ftp: loaded support on port[0] = 21 00:54:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:48 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) setns(r1, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(0xffffffffffffffff) 00:54:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0xffffffffffff45f3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000080)=0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x1, @loopback={0x0, 0x1}, 0xffffffff}}, 0x100000000, 0x101, 0x6, "f38d9876d8be168139730b8b042fa2c8214e6568b2d16a25d2e59dca31dc7fe036fc570d30c338305adc12e4983339e174b521b5c98e4359d073309eb441369734f7bd2ce91befd2c40b8e8cf1fae4bc"}, 0xd8) 00:54:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2271, &(0x7f0000000080)) 00:54:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:48 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227d, &(0x7f0000000080)) 00:54:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:48 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x9b1720) 00:54:48 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5382, &(0x7f0000000080)) 00:54:48 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0045877, &(0x7f0000000080)) 00:54:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x101, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x1) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/110) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100)=0x6, 0x4) 00:54:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:49 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0045878, &(0x7f0000000080)) 00:54:49 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2282, &(0x7f0000000080)) [ 173.330594] IPVS: ftp: loaded support on port[0] = 21 00:54:49 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000400)) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x8000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000080)=""/143) 00:54:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:49 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xba4f50) 00:54:49 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227d, &(0x7f0000000080)) 00:54:49 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0481273, &(0x7f0000000080)) 00:54:49 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc020660b, &(0x7f0000000080)) 00:54:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 00:54:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:49 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2285, &(0x7f0000000080)) 00:54:49 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 173.894332] IPVS: ftp: loaded support on port[0] = 21 [ 173.929201] FAULT_INJECTION: forcing a failure. [ 173.929201] name failslab, interval 1, probability 0, space 0, times 0 [ 173.940600] CPU: 0 PID: 12044 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 173.947971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.957335] Call Trace: [ 173.959940] dump_stack+0x1c9/0x2b4 [ 173.963621] ? dump_stack_print_info.cold.2+0x52/0x52 [ 173.968846] should_fail.cold.4+0xa/0x1a [ 173.972933] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 173.978063] ? lock_downgrade+0x8f0/0x8f0 [ 173.982234] ? proc_fail_nth_write+0x9e/0x210 [ 173.986745] ? proc_cwd_link+0x1d0/0x1d0 [ 173.990828] ? find_held_lock+0x36/0x1c0 [ 173.994924] ? check_same_owner+0x340/0x340 [ 173.999263] ? rcu_note_context_switch+0x730/0x730 [ 174.004213] __should_failslab+0x124/0x180 [ 174.008566] should_failslab+0x9/0x14 [ 174.012387] __kmalloc+0x2c8/0x760 [ 174.015945] ? strncpy_from_user+0x510/0x510 [ 174.020382] ? fput+0x130/0x1a0 [ 174.023677] ? __x64_sys_memfd_create+0x142/0x4f0 [ 174.028540] __x64_sys_memfd_create+0x142/0x4f0 [ 174.033231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.038792] ? memfd_fcntl+0x1400/0x1400 [ 174.042861] ? do_syscall_64+0x9a/0x820 [ 174.046855] do_syscall_64+0x1b9/0x820 [ 174.050743] ? syscall_return_slowpath+0x5e0/0x5e0 [ 174.055675] ? syscall_return_slowpath+0x31d/0x5e0 [ 174.060621] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 174.066003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 174.070849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.076037] RIP: 0033:0x455e29 [ 174.079209] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.098561] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 174.106272] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 174.113531] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 174.120790] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 00:54:49 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2205, &(0x7f0000000080)) 00:54:49 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1275, &(0x7f0000000080)) [ 174.128049] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 174.135307] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 00:54:50 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1275, &(0x7f0000000080)) 00:54:50 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:50 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x6cc3c0) 00:54:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2202, &(0x7f0000000080)) 00:54:50 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2279, &(0x7f0000000080)) [ 174.422833] FAULT_INJECTION: forcing a failure. [ 174.422833] name failslab, interval 1, probability 0, space 0, times 0 [ 174.434258] CPU: 1 PID: 12078 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 174.441630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.451008] Call Trace: [ 174.453614] dump_stack+0x1c9/0x2b4 [ 174.457262] ? dump_stack_print_info.cold.2+0x52/0x52 [ 174.462475] ? print_usage_bug+0xc0/0xc0 [ 174.466655] should_fail.cold.4+0xa/0x1a 00:54:50 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1275, &(0x7f0000000080)) [ 174.470735] ? trace_hardirqs_on+0x10/0x10 [ 174.475006] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 174.480135] ? find_held_lock+0x36/0x1c0 [ 174.484231] ? find_held_lock+0x36/0x1c0 [ 174.488331] ? check_same_owner+0x340/0x340 [ 174.490553] FAULT_INJECTION: forcing a failure. [ 174.490553] name failslab, interval 1, probability 0, space 0, times 0 [ 174.492664] ? rcu_note_context_switch+0x730/0x730 [ 174.492681] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 174.492706] __should_failslab+0x124/0x180 [ 174.518050] should_failslab+0x9/0x14 [ 174.521849] kmem_cache_alloc+0x2af/0x760 [ 174.525999] __d_alloc+0xc8/0xd50 [ 174.529455] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 174.534463] ? do_raw_spin_unlock+0xa7/0x2f0 [ 174.538863] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 174.543445] ? __lock_is_held+0xb5/0x140 [ 174.547511] ? _raw_spin_unlock+0x22/0x30 [ 174.551651] ? __alloc_fd+0x34e/0x710 [ 174.555450] ? exit_files+0xb0/0xb0 [ 174.559076] d_alloc_pseudo+0x1d/0x30 [ 174.562870] __shmem_file_setup+0x1f3/0x700 [ 174.567186] ? check_same_owner+0x340/0x340 [ 174.571502] ? shmem_fill_super+0xa50/0xa50 [ 174.575819] ? get_unused_fd_flags+0x122/0x1a0 [ 174.580392] ? __alloc_fd+0x710/0x710 [ 174.584192] shmem_file_setup+0x2f/0x40 [ 174.588161] __x64_sys_memfd_create+0x2af/0x4f0 [ 174.592829] ? memfd_fcntl+0x1400/0x1400 [ 174.596885] ? do_syscall_64+0x9a/0x820 [ 174.600858] do_syscall_64+0x1b9/0x820 [ 174.604737] ? finish_task_switch+0x1d3/0x870 [ 174.609229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 174.614152] ? syscall_return_slowpath+0x31d/0x5e0 [ 174.619079] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 174.624453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 174.629296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.634475] RIP: 0033:0x455e29 [ 174.637648] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.656963] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 174.664672] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 174.671935] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 174.679196] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 174.686455] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 174.693713] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 [ 174.700991] CPU: 0 PID: 12079 Comm: syz-executor2 Not tainted 4.18.0-rc3+ #137 [ 174.708353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.717699] Call Trace: [ 174.720275] dump_stack+0x1c9/0x2b4 [ 174.723897] ? dump_stack_print_info.cold.2+0x52/0x52 [ 174.729085] should_fail.cold.4+0xa/0x1a [ 174.733134] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 174.738225] ? lock_downgrade+0x8f0/0x8f0 [ 174.742369] ? proc_fail_nth_write+0x9e/0x210 [ 174.746847] ? proc_cwd_link+0x1d0/0x1d0 [ 174.750893] ? find_held_lock+0x36/0x1c0 [ 174.754954] ? check_same_owner+0x340/0x340 [ 174.759269] ? rcu_note_context_switch+0x730/0x730 [ 174.764185] __should_failslab+0x124/0x180 [ 174.768405] should_failslab+0x9/0x14 [ 174.772188] __kmalloc+0x2c8/0x760 [ 174.775715] ? strncpy_from_user+0x510/0x510 [ 174.780107] ? fput+0x130/0x1a0 [ 174.783374] ? __x64_sys_memfd_create+0x142/0x4f0 [ 174.788215] __x64_sys_memfd_create+0x142/0x4f0 [ 174.792879] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.798405] ? memfd_fcntl+0x1400/0x1400 [ 174.802454] ? do_syscall_64+0x9a/0x820 [ 174.806417] do_syscall_64+0x1b9/0x820 [ 174.810291] ? finish_task_switch+0x1d3/0x870 [ 174.814778] ? syscall_return_slowpath+0x5e0/0x5e0 [ 174.819697] ? syscall_return_slowpath+0x31d/0x5e0 [ 174.824622] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 174.829979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 174.834818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.840001] RIP: 0033:0x455e29 [ 174.843178] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.862409] RSP: 002b:00007f15278a2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 00:54:50 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1276, &(0x7f0000000080)) [ 174.870115] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 174.877371] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 174.884637] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 174.891903] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 174.899158] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000000 00:54:50 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x87f4b0) [ 174.998735] IPVS: ftp: loaded support on port[0] = 21 00:54:50 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5382, &(0x7f0000000080)) 00:54:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:50 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:50 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2279, &(0x7f0000000080)) [ 175.231673] FAULT_INJECTION: forcing a failure. [ 175.231673] name failslab, interval 1, probability 0, space 0, times 0 [ 175.242983] CPU: 1 PID: 12107 Comm: syz-executor2 Not tainted 4.18.0-rc3+ #137 [ 175.250351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.259715] Call Trace: [ 175.262323] dump_stack+0x1c9/0x2b4 [ 175.265978] ? dump_stack_print_info.cold.2+0x52/0x52 [ 175.271274] ? print_usage_bug+0xc0/0xc0 [ 175.275355] should_fail.cold.4+0xa/0x1a [ 175.279430] ? trace_hardirqs_on+0x10/0x10 [ 175.283667] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.288773] ? find_held_lock+0x36/0x1c0 [ 175.292854] ? find_held_lock+0x36/0x1c0 [ 175.296928] ? check_same_owner+0x340/0x340 [ 175.301244] ? rcu_note_context_switch+0x730/0x730 [ 175.306172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 175.311185] __should_failslab+0x124/0x180 [ 175.315413] should_failslab+0x9/0x14 [ 175.319203] kmem_cache_alloc+0x2af/0x760 [ 175.323349] __d_alloc+0xc8/0xd50 [ 175.326797] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 175.331800] ? do_raw_spin_unlock+0xa7/0x2f0 [ 175.336200] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 175.340783] ? __lock_is_held+0xb5/0x140 [ 175.344847] ? _raw_spin_unlock+0x22/0x30 [ 175.348990] ? __alloc_fd+0x34e/0x710 [ 175.352792] ? exit_files+0xb0/0xb0 [ 175.356423] d_alloc_pseudo+0x1d/0x30 [ 175.360232] __shmem_file_setup+0x1f3/0x700 [ 175.364559] ? check_same_owner+0x340/0x340 [ 175.368887] ? shmem_fill_super+0xa50/0xa50 [ 175.373211] ? get_unused_fd_flags+0x122/0x1a0 [ 175.377788] ? __alloc_fd+0x710/0x710 [ 175.381594] shmem_file_setup+0x2f/0x40 [ 175.385580] __x64_sys_memfd_create+0x2af/0x4f0 [ 175.390260] ? memfd_fcntl+0x1400/0x1400 [ 175.394327] ? do_syscall_64+0x9a/0x820 [ 175.398298] do_syscall_64+0x1b9/0x820 [ 175.402179] ? finish_task_switch+0x1d3/0x870 [ 175.406676] ? syscall_return_slowpath+0x5e0/0x5e0 [ 175.411614] ? syscall_return_slowpath+0x31d/0x5e0 [ 175.416549] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 175.421919] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 175.426765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.431946] RIP: 0033:0x455e29 [ 175.435134] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.454566] RSP: 002b:00007f15278a2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 175.462274] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 175.469537] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 175.476795] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 175.484052] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 175.491319] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000001 [ 175.506951] FAULT_INJECTION: forcing a failure. [ 175.506951] name failslab, interval 1, probability 0, space 0, times 0 [ 175.518396] CPU: 0 PID: 12114 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 175.525768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.535131] Call Trace: [ 175.537735] dump_stack+0x1c9/0x2b4 [ 175.541381] ? dump_stack_print_info.cold.2+0x52/0x52 [ 175.546611] ? __kernel_text_address+0xd/0x40 [ 175.551134] should_fail.cold.4+0xa/0x1a [ 175.555214] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.560357] ? save_stack+0xa9/0xd0 [ 175.564012] ? save_stack+0x43/0xd0 [ 175.567642] ? kasan_kmalloc+0xc4/0xe0 [ 175.571540] ? kmem_cache_alloc+0x12e/0x760 [ 175.575872] ? __d_alloc+0xc8/0xd50 [ 175.579500] ? d_alloc_pseudo+0x1d/0x30 [ 175.583475] ? __shmem_file_setup+0x1f3/0x700 [ 175.587979] ? shmem_file_setup+0x2f/0x40 [ 175.592136] ? find_held_lock+0x36/0x1c0 [ 175.596222] ? check_same_owner+0x340/0x340 [ 175.600550] ? rcu_note_context_switch+0x730/0x730 [ 175.605495] ? kasan_check_read+0x11/0x20 [ 175.609664] __should_failslab+0x124/0x180 [ 175.613923] should_failslab+0x9/0x14 [ 175.617736] kmem_cache_alloc+0x2af/0x760 [ 175.621902] ? rcu_read_lock_sched_held+0x108/0x120 [ 175.626932] ? kmem_cache_alloc+0x5fa/0x760 [ 175.631272] ? shmem_destroy_callback+0xc0/0xc0 [ 175.635959] shmem_alloc_inode+0x1b/0x40 [ 175.640041] alloc_inode+0x63/0x190 [ 175.643699] new_inode_pseudo+0x71/0x1a0 [ 175.647789] ? prune_icache_sb+0x1b0/0x1b0 [ 175.652047] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 175.657087] new_inode+0x1c/0x40 [ 175.660472] shmem_get_inode+0xf1/0x910 [ 175.664479] ? shmem_encode_fh+0x340/0x340 [ 175.668751] ? _raw_spin_unlock+0x22/0x30 [ 175.672912] ? __alloc_fd+0x34e/0x710 [ 175.676744] ? exit_files+0xb0/0xb0 [ 175.680390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.685952] __shmem_file_setup+0x259/0x700 [ 175.690278] ? check_same_owner+0x340/0x340 [ 175.694610] ? shmem_fill_super+0xa50/0xa50 [ 175.698944] ? get_unused_fd_flags+0x122/0x1a0 [ 175.703534] ? __alloc_fd+0x710/0x710 [ 175.707354] shmem_file_setup+0x2f/0x40 [ 175.711431] __x64_sys_memfd_create+0x2af/0x4f0 [ 175.716113] ? memfd_fcntl+0x1400/0x1400 [ 175.720187] ? do_syscall_64+0x9a/0x820 [ 175.724161] do_syscall_64+0x1b9/0x820 [ 175.728042] ? finish_task_switch+0x1d3/0x870 [ 175.732527] ? syscall_return_slowpath+0x5e0/0x5e0 [ 175.737445] ? syscall_return_slowpath+0x31d/0x5e0 [ 175.742376] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 175.747734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 175.752584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.757765] RIP: 0033:0x455e29 [ 175.760940] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.780312] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 175.788028] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 175.795289] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 175.802545] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 175.809813] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 175.817075] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 00:54:51 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x6fc930) 00:54:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:51 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:51 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:51 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5387, &(0x7f0000000080)) 00:54:51 executing program 0: getpid() mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) setns(r1, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r0) [ 175.902675] FAULT_INJECTION: forcing a failure. [ 175.902675] name failslab, interval 1, probability 0, space 0, times 0 [ 175.914023] CPU: 1 PID: 12133 Comm: syz-executor2 Not tainted 4.18.0-rc3+ #137 [ 175.921393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.930751] Call Trace: [ 175.933361] dump_stack+0x1c9/0x2b4 [ 175.937001] ? dump_stack_print_info.cold.2+0x52/0x52 [ 175.942208] ? __kernel_text_address+0xd/0x40 [ 175.946748] should_fail.cold.4+0xa/0x1a 00:54:51 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x6, &(0x7f0000000080)) [ 175.950827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 175.955948] ? save_stack+0xa9/0xd0 [ 175.959589] ? save_stack+0x43/0xd0 [ 175.963226] ? kasan_kmalloc+0xc4/0xe0 [ 175.967122] ? kasan_slab_alloc+0x12/0x20 [ 175.971279] ? kmem_cache_alloc+0x12e/0x760 [ 175.975615] ? __d_alloc+0xc8/0xd50 [ 175.979250] ? d_alloc_pseudo+0x1d/0x30 [ 175.983260] ? __shmem_file_setup+0x1f3/0x700 [ 175.987764] ? shmem_file_setup+0x2f/0x40 [ 175.991929] ? find_held_lock+0x36/0x1c0 [ 175.996021] ? check_same_owner+0x340/0x340 [ 176.000366] ? rcu_note_context_switch+0x730/0x730 [ 176.005317] ? kasan_check_read+0x11/0x20 [ 176.009486] __should_failslab+0x124/0x180 [ 176.013744] should_failslab+0x9/0x14 [ 176.017538] kmem_cache_alloc+0x2af/0x760 [ 176.021684] ? rcu_read_lock_sched_held+0x108/0x120 [ 176.026712] ? kmem_cache_alloc+0x5fa/0x760 [ 176.031029] ? shmem_destroy_callback+0xc0/0xc0 [ 176.035694] shmem_alloc_inode+0x1b/0x40 [ 176.039748] alloc_inode+0x63/0x190 [ 176.043365] new_inode_pseudo+0x71/0x1a0 [ 176.047418] ? prune_icache_sb+0x1b0/0x1b0 [ 176.051647] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 176.056667] new_inode+0x1c/0x40 [ 176.060029] shmem_get_inode+0xf1/0x910 [ 176.063996] ? shmem_encode_fh+0x340/0x340 [ 176.068223] ? _raw_spin_unlock+0x22/0x30 [ 176.072360] ? __alloc_fd+0x34e/0x710 [ 176.076164] ? exit_files+0xb0/0xb0 [ 176.079784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.085408] __shmem_file_setup+0x259/0x700 [ 176.089719] ? check_same_owner+0x340/0x340 [ 176.094036] ? shmem_fill_super+0xa50/0xa50 [ 176.098353] ? get_unused_fd_flags+0x122/0x1a0 [ 176.102923] ? __alloc_fd+0x710/0x710 [ 176.106715] shmem_file_setup+0x2f/0x40 [ 176.110682] __x64_sys_memfd_create+0x2af/0x4f0 [ 176.115341] ? memfd_fcntl+0x1400/0x1400 [ 176.119395] ? do_syscall_64+0x9a/0x820 [ 176.123361] do_syscall_64+0x1b9/0x820 [ 176.127234] ? finish_task_switch+0x1d3/0x870 [ 176.131727] ? syscall_return_slowpath+0x5e0/0x5e0 [ 176.136657] ? syscall_return_slowpath+0x31d/0x5e0 [ 176.141580] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 176.146938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 176.151786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.156963] RIP: 0033:0x455e29 [ 176.160136] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.179469] RSP: 002b:00007f15278a2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 176.187177] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 176.194432] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 00:54:52 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:52 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227a, &(0x7f0000000080)) 00:54:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) [ 176.201702] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 176.208957] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 176.216212] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000002 [ 176.306210] IPVS: ftp: loaded support on port[0] = 21 [ 176.314382] FAULT_INJECTION: forcing a failure. [ 176.314382] name failslab, interval 1, probability 0, space 0, times 0 [ 176.325677] CPU: 1 PID: 12151 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 176.333047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.342413] Call Trace: [ 176.345016] dump_stack+0x1c9/0x2b4 [ 176.348683] ? dump_stack_print_info.cold.2+0x52/0x52 00:54:52 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 176.353896] ? __lock_acquire+0x7fc/0x5020 [ 176.358159] should_fail.cold.4+0xa/0x1a [ 176.362245] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 176.367378] ? find_held_lock+0x36/0x1c0 [ 176.371457] ? graph_lock+0x170/0x170 [ 176.375290] ? find_held_lock+0x36/0x1c0 [ 176.379395] ? check_same_owner+0x340/0x340 [ 176.383733] ? graph_lock+0x170/0x170 [ 176.387553] ? rcu_note_context_switch+0x730/0x730 [ 176.392496] ? kasan_check_read+0x11/0x20 [ 176.396667] __should_failslab+0x124/0x180 [ 176.400925] should_failslab+0x9/0x14 [ 176.404742] kmem_cache_alloc+0x2af/0x760 [ 176.408908] ? find_held_lock+0x36/0x1c0 [ 176.411582] FAULT_INJECTION: forcing a failure. [ 176.411582] name failslab, interval 1, probability 0, space 0, times 0 [ 176.412991] get_empty_filp+0x12d/0x530 [ 176.413010] ? proc_nr_files+0x60/0x60 [ 176.413037] ? kasan_check_read+0x11/0x20 [ 176.413057] ? do_raw_spin_unlock+0xa7/0x2f0 [ 176.413070] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 176.413093] ? kasan_check_write+0x14/0x20 [ 176.449485] ? do_raw_spin_lock+0xc1/0x200 [ 176.453721] alloc_file+0x24/0x3e0 [ 176.457255] ? clear_nlink.part.9+0x65/0x80 [ 176.461577] __shmem_file_setup+0x313/0x700 [ 176.465903] ? check_same_owner+0x340/0x340 [ 176.470223] ? shmem_fill_super+0xa50/0xa50 [ 176.474543] ? get_unused_fd_flags+0x122/0x1a0 [ 176.479118] ? __alloc_fd+0x710/0x710 [ 176.482921] shmem_file_setup+0x2f/0x40 [ 176.486903] __x64_sys_memfd_create+0x2af/0x4f0 [ 176.491571] ? memfd_fcntl+0x1400/0x1400 [ 176.495632] ? do_syscall_64+0x9a/0x820 [ 176.499610] do_syscall_64+0x1b9/0x820 [ 176.503499] ? finish_task_switch+0x1d3/0x870 [ 176.507994] ? syscall_return_slowpath+0x5e0/0x5e0 [ 176.512923] ? syscall_return_slowpath+0x31d/0x5e0 [ 176.517856] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 176.523232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 176.528084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.533270] RIP: 0033:0x455e29 [ 176.536450] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.555807] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 176.563514] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 176.570777] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 176.578038] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 176.585313] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 176.592588] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 [ 176.599873] CPU: 0 PID: 12154 Comm: syz-executor2 Not tainted 4.18.0-rc3+ #137 [ 176.607240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.616617] Call Trace: [ 176.619219] dump_stack+0x1c9/0x2b4 [ 176.622862] ? dump_stack_print_info.cold.2+0x52/0x52 [ 176.628069] ? __lock_acquire+0x7fc/0x5020 [ 176.632349] should_fail.cold.4+0xa/0x1a [ 176.636432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 176.641555] ? find_held_lock+0x36/0x1c0 [ 176.645644] ? graph_lock+0x170/0x170 [ 176.649477] ? find_held_lock+0x36/0x1c0 [ 176.653570] ? check_same_owner+0x340/0x340 [ 176.657907] ? graph_lock+0x170/0x170 [ 176.661742] ? rcu_note_context_switch+0x730/0x730 [ 176.666708] ? kasan_check_read+0x11/0x20 [ 176.670872] __should_failslab+0x124/0x180 [ 176.675120] should_failslab+0x9/0x14 [ 176.678940] kmem_cache_alloc+0x2af/0x760 [ 176.683119] ? find_held_lock+0x36/0x1c0 [ 176.687181] get_empty_filp+0x12d/0x530 [ 176.691152] ? proc_nr_files+0x60/0x60 [ 176.695036] ? kasan_check_read+0x11/0x20 [ 176.699174] ? do_raw_spin_unlock+0xa7/0x2f0 [ 176.703593] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 176.708165] ? kasan_check_write+0x14/0x20 [ 176.712385] ? do_raw_spin_lock+0xc1/0x200 [ 176.716615] alloc_file+0x24/0x3e0 [ 176.720143] ? clear_nlink.part.9+0x65/0x80 [ 176.724453] __shmem_file_setup+0x313/0x700 [ 176.728774] ? check_same_owner+0x340/0x340 [ 176.733084] ? shmem_fill_super+0xa50/0xa50 [ 176.737394] ? get_unused_fd_flags+0x122/0x1a0 [ 176.741978] ? __alloc_fd+0x710/0x710 [ 176.745776] shmem_file_setup+0x2f/0x40 [ 176.749740] __x64_sys_memfd_create+0x2af/0x4f0 [ 176.754400] ? memfd_fcntl+0x1400/0x1400 [ 176.758451] ? do_syscall_64+0x9a/0x820 [ 176.762427] do_syscall_64+0x1b9/0x820 [ 176.766313] ? finish_task_switch+0x1d3/0x870 [ 176.770805] ? syscall_return_slowpath+0x5e0/0x5e0 [ 176.775731] ? syscall_return_slowpath+0x31d/0x5e0 [ 176.780675] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 176.786042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 176.790877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.796151] RIP: 0033:0x455e29 [ 176.799322] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.818930] RSP: 002b:00007f15278a2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 176.826629] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 176.833884] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 176.841152] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 176.848611] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 00:54:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:52 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:52 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5450, &(0x7f0000000080)) [ 176.855869] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000003 00:54:52 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:52 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2276, &(0x7f0000000080)) [ 176.987235] FAULT_INJECTION: forcing a failure. [ 176.987235] name failslab, interval 1, probability 0, space 0, times 0 [ 176.998587] CPU: 0 PID: 12170 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 177.005958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.015322] Call Trace: [ 177.017927] dump_stack+0x1c9/0x2b4 [ 177.021571] ? dump_stack_print_info.cold.2+0x52/0x52 [ 177.026783] ? __lock_acquire+0x7fc/0x5020 [ 177.031047] should_fail.cold.4+0xa/0x1a [ 177.035131] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 177.040259] ? find_held_lock+0x36/0x1c0 [ 177.044341] ? graph_lock+0x170/0x170 [ 177.048175] ? find_held_lock+0x36/0x1c0 [ 177.052274] ? check_same_owner+0x340/0x340 [ 177.056602] ? graph_lock+0x170/0x170 [ 177.060406] ? rcu_note_context_switch+0x730/0x730 [ 177.065357] ? kasan_check_read+0x11/0x20 [ 177.069505] __should_failslab+0x124/0x180 [ 177.073743] should_failslab+0x9/0x14 [ 177.077534] kmem_cache_alloc+0x2af/0x760 [ 177.081673] ? find_held_lock+0x36/0x1c0 [ 177.085734] get_empty_filp+0x12d/0x530 [ 177.089699] ? proc_nr_files+0x60/0x60 [ 177.093596] ? kasan_check_read+0x11/0x20 [ 177.097768] ? do_raw_spin_unlock+0xa7/0x2f0 [ 177.102168] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 177.106752] ? kasan_check_write+0x14/0x20 [ 177.110980] ? do_raw_spin_lock+0xc1/0x200 [ 177.115210] alloc_file+0x24/0x3e0 [ 177.118763] ? clear_nlink.part.9+0x65/0x80 [ 177.123090] __shmem_file_setup+0x313/0x700 [ 177.127405] ? check_same_owner+0x340/0x340 [ 177.131746] ? shmem_fill_super+0xa50/0xa50 [ 177.136061] ? get_unused_fd_flags+0x122/0x1a0 [ 177.140632] ? __alloc_fd+0x710/0x710 [ 177.144429] shmem_file_setup+0x2f/0x40 [ 177.148397] __x64_sys_memfd_create+0x2af/0x4f0 [ 177.153062] ? memfd_fcntl+0x1400/0x1400 [ 177.157116] ? do_syscall_64+0x9a/0x820 [ 177.161101] do_syscall_64+0x1b9/0x820 [ 177.164977] ? finish_task_switch+0x1d3/0x870 [ 177.169462] ? syscall_return_slowpath+0x5e0/0x5e0 [ 177.174383] ? syscall_return_slowpath+0x31d/0x5e0 [ 177.179313] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 177.184676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 177.189534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.194720] RIP: 0033:0x455e29 [ 177.197897] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.217246] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 177.224969] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000455e29 [ 177.232229] RDX: 0000000020000418 RSI: 0000000000000000 RDI: 00000000004baa70 [ 177.239488] RBP: 000000000072bea0 R08: 0000000020000418 R09: 00000000fbad8001 [ 177.246782] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 177.254043] R13: 00000000004c2588 R14: 00000000004d3e38 R15: 0000000000000004 00:54:53 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xb94d80) 00:54:53 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0045877, &(0x7f0000000080)) 00:54:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:53 executing program 0: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) setns(r1, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r0) 00:54:53 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2287, &(0x7f0000000080)) 00:54:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1275, &(0x7f0000000080)) [ 177.546639] IPVS: ftp: loaded support on port[0] = 21 00:54:53 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xc15c00) 00:54:53 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:53 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2202, &(0x7f0000000080)) 00:54:53 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1275, &(0x7f0000000080)) 00:54:53 executing program 0: r0 = getpid() sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) [ 177.760967] FAULT_INJECTION: forcing a failure. [ 177.760967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 177.772944] CPU: 1 PID: 12222 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 177.780341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.789712] Call Trace: [ 177.792317] dump_stack+0x1c9/0x2b4 [ 177.795965] ? dump_stack_print_info.cold.2+0x52/0x52 [ 177.801180] ? zap_class+0x740/0x740 [ 177.804926] should_fail.cold.4+0xa/0x1a [ 177.809010] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 177.814140] ? graph_lock+0x170/0x170 [ 177.817964] ? find_held_lock+0x36/0x1c0 [ 177.822051] ? find_held_lock+0x36/0x1c0 [ 177.826135] ? __lock_is_held+0xb5/0x140 [ 177.830228] ? check_same_owner+0x340/0x340 [ 177.834566] ? rcu_note_context_switch+0x730/0x730 [ 177.839519] __alloc_pages_nodemask+0x36e/0xdb0 [ 177.844239] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 177.849287] ? trace_hardirqs_on+0x10/0x10 [ 177.853546] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 177.858580] ? percpu_counter_add_batch+0xf2/0x150 [ 177.863532] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 177.868576] ? __vm_enough_memory+0x590/0x980 [ 177.873103] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 177.878661] alloc_pages_vma+0xdd/0x540 [ 177.882664] shmem_alloc_page+0xa8/0x190 [ 177.886736] ? shmem_swapin+0x230/0x230 [ 177.890753] shmem_alloc_and_acct_page+0x1f1/0x820 [ 177.895702] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 177.900386] ? print_usage_bug+0xc0/0xc0 [ 177.904480] shmem_getpage_gfp+0x6ea/0x41e0 [ 177.908831] ? print_usage_bug+0xc0/0xc0 [ 177.912910] ? shmem_writepage+0x1380/0x1380 [ 177.917335] ? print_usage_bug+0xc0/0xc0 [ 177.921416] ? __lock_acquire+0x7fc/0x5020 [ 177.925674] ? print_usage_bug+0xc0/0xc0 [ 177.929755] ? __lock_acquire+0x7fc/0x5020 [ 177.934005] ? print_usage_bug+0xc0/0xc0 [ 177.938081] ? __lock_acquire+0x7fc/0x5020 [ 177.942327] ? __lock_acquire+0x7fc/0x5020 [ 177.946577] ? check_noncircular+0x20/0x20 [ 177.950827] ? __lock_acquire+0x7fc/0x5020 [ 177.955079] ? __lock_acquire+0x7fc/0x5020 [ 177.959318] ? zap_class+0x740/0x740 [ 177.963056] ? trace_hardirqs_on+0x10/0x10 [ 177.967299] ? print_usage_bug+0xc0/0xc0 [ 177.971358] ? zap_class+0x740/0x740 [ 177.975065] ? print_usage_bug+0xc0/0xc0 [ 177.979115] ? zap_class+0x740/0x740 [ 177.982818] ? print_usage_bug+0xc0/0xc0 [ 177.986877] ? perf_trace_lock+0xde/0x920 [ 177.991029] ? zap_class+0x740/0x740 [ 177.994733] ? zap_class+0x740/0x740 [ 177.998451] ? graph_lock+0x170/0x170 [ 178.002244] ? find_held_lock+0x36/0x1c0 [ 178.006295] ? print_usage_bug+0xc0/0xc0 [ 178.010362] ? lock_downgrade+0x8f0/0x8f0 [ 178.014496] ? kasan_check_read+0x11/0x20 [ 178.018632] ? lock_release+0xa30/0xa30 [ 178.022599] ? mark_held_locks+0xc9/0x160 [ 178.026736] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 178.032261] ? iov_iter_fault_in_readable+0x23d/0x460 [ 178.037438] ? copy_page_from_iter+0x890/0x890 [ 178.042012] ? __sanitizer_cov_trace_const_cmp1+0x1d/0x20 [ 178.047539] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 178.052720] shmem_write_begin+0x110/0x1e0 [ 178.056949] generic_perform_write+0x3ae/0x6c0 [ 178.061538] ? add_page_wait_queue+0x2c0/0x2c0 [ 178.066108] ? file_update_time+0xe4/0x640 [ 178.070333] ? current_time+0x1b0/0x1b0 [ 178.074306] ? down_write+0x8f/0x130 [ 178.078014] __generic_file_write_iter+0x26e/0x630 [ 178.082940] generic_file_write_iter+0x438/0x870 [ 178.087700] ? __generic_file_write_iter+0x630/0x630 [ 178.092794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 178.098321] ? iov_iter_init+0xc9/0x1f0 [ 178.102287] __vfs_write+0x6c6/0x9f0 [ 178.106004] ? kernel_read+0x120/0x120 [ 178.109889] ? __lock_is_held+0xb5/0x140 [ 178.113948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.119478] ? __sb_start_write+0x17f/0x300 [ 178.123790] vfs_write+0x1f8/0x560 [ 178.127319] ksys_pwrite64+0x181/0x1b0 [ 178.131193] ? __ia32_sys_pread64+0xf0/0xf0 [ 178.135502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 178.141029] ? fput+0x130/0x1a0 [ 178.144297] ? do_sys_ftruncate+0x44e/0x560 [ 178.148605] __x64_sys_pwrite64+0x97/0xf0 [ 178.152745] do_syscall_64+0x1b9/0x820 [ 178.156619] ? syscall_slow_exit_work+0x500/0x500 [ 178.161450] ? syscall_return_slowpath+0x5e0/0x5e0 [ 178.166368] ? syscall_return_slowpath+0x31d/0x5e0 [ 178.171293] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 178.176652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 178.181488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.186669] RIP: 0033:0x4100e7 [ 178.189840] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 00:54:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 178.209283] RSP: 002b:00007fc8fe85da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 178.216990] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 00000000004100e7 [ 178.224248] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000014 [ 178.231503] RBP: 0000000000000000 R08: 0000000020000418 R09: 00000000fbad8001 [ 178.238757] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 178.246017] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000005 [ 178.342725] IPVS: ftp: loaded support on port[0] = 21 00:54:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2205, &(0x7f0000000080)) 00:54:54 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x4e8d60) 00:54:54 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1274, &(0x7f0000000080)) 00:54:54 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1275, &(0x7f0000000080)) 00:54:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:54 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2282, &(0x7f0000000080)) 00:54:54 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) 00:54:54 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x8bfbf0) 00:54:54 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1276, &(0x7f0000000080)) 00:54:54 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="627472667305", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:54 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2289, &(0x7f0000000080)) [ 178.824838] FAULT_INJECTION: forcing a failure. [ 178.824838] name failslab, interval 1, probability 0, space 0, times 0 [ 178.832588] IPVS: ftp: loaded support on port[0] = 21 [ 178.836163] CPU: 0 PID: 12313 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 178.848689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.858053] Call Trace: [ 178.860660] dump_stack+0x1c9/0x2b4 [ 178.864307] ? dump_stack_print_info.cold.2+0x52/0x52 [ 178.869521] ? add_page_wait_queue+0x2c0/0x2c0 [ 178.874128] should_fail.cold.4+0xa/0x1a [ 178.878219] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 178.883344] ? up_write+0x7b/0x220 [ 178.886925] ? up_read+0x110/0x110 [ 178.890486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 178.896046] ? __generic_file_write_iter+0x1bd/0x630 [ 178.901180] ? find_held_lock+0x36/0x1c0 [ 178.905280] ? check_same_owner+0x340/0x340 [ 178.909624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.915188] ? rcu_note_context_switch+0x730/0x730 [ 178.920141] ? lock_downgrade+0x8f0/0x8f0 [ 178.924307] __should_failslab+0x124/0x180 [ 178.928580] should_failslab+0x9/0x14 [ 178.932399] kmem_cache_alloc+0x2af/0x760 [ 178.936581] getname_flags+0xd0/0x5a0 [ 178.940397] ? __sb_end_write+0xac/0xe0 [ 178.944395] getname+0x19/0x20 [ 178.947861] do_sys_open+0x3a2/0x760 [ 178.951595] ? filp_open+0x80/0x80 [ 178.955157] ? do_sys_ftruncate+0x44e/0x560 [ 178.959525] __x64_sys_open+0x7e/0xc0 [ 178.963352] do_syscall_64+0x1b9/0x820 [ 178.967244] ? finish_task_switch+0x1d3/0x870 00:54:54 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2285, &(0x7f0000000080)) 00:54:54 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x50910) [ 178.971751] ? syscall_return_slowpath+0x5e0/0x5e0 [ 178.976694] ? syscall_return_slowpath+0x31d/0x5e0 [ 178.981643] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 178.987023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 178.991884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.997079] RIP: 0033:0x410081 [ 179.000266] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 00:54:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) [ 179.019646] RSP: 002b:00007fc8fe85da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 179.027374] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000410081 [ 179.034656] RDX: 00007fc8fe85dafa RSI: 0000000000000002 RDI: 00007fc8fe85daf0 [ 179.041956] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 179.049236] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 179.056515] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000006 00:54:54 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2276, &(0x7f0000000080)) 00:54:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5, &(0x7f0000000080)) 00:54:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) 00:54:55 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:55 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:55 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xa223d0) 00:54:55 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5380, &(0x7f0000000080)) [ 179.472425] IPVS: ftp: loaded support on port[0] = 21 00:54:55 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2201, &(0x7f0000000080)) 00:54:55 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:55 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000100)) fsync(r0) r2 = getgid() fchown(r0, r1, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000180)={0x49, 0x29, 0x2, {0x6ccc8bac, [{{0x80, 0x1}, 0x2, 0x0, 0x7, './file0'}, {{0x80, 0x2, 0x7}, 0x0, 0x10000, 0x7, './file0'}]}}, 0x49) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:55 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x970fe0) 00:54:55 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000280)="5a960c604ae7eeb923af3118f7f339b74d6726d329c7bd028f489ea1e88f69fc509afa431e4f507557aeb0dc93d251e1bc8aa1327e1c68b03dab715f8cb3c16db74c7d5a04d02a9c45ac1306610a626ba076a7a7c2b550350cf541f35a107c4cf8eb1f9752d7395a8a4b537a7fa85fe20e531c6356b0ee5e10bfecb091aafe5f9f3e008721b336d481c6a2b7d27af79384caf709e5745adf560bf66262659a92b8810b1a2b9c9079243489edd138b033e346a72b5f6ded2f2f6c") syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x254, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@discard='discard', 0x2c}, {@resize_size={'resize', 0x3d, [0x34, 0x38, 0x7b]}, 0x2c}, {@resize_size={'resize', 0x3d, [0x3f, 0x32, 0x2d, 0x3f, 0x36]}, 0x2c}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r1, &(0x7f0000000100)=@l2, &(0x7f0000000080)=0x80) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x2000, 0x0) recvmsg$kcm(r2, &(0x7f0000001a40)={&(0x7f0000000400)=@alg, 0x80, &(0x7f0000001940)=[{&(0x7f0000000480)=""/130, 0x82}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/173, 0xad}, {&(0x7f0000001600)=""/86, 0x56}, {&(0x7f0000000340)=""/63, 0x3f}, {&(0x7f0000001680)=""/179, 0xb3}, {&(0x7f0000001740)=""/216, 0xd8}, {&(0x7f0000001840)=""/201, 0xc9}], 0x8, &(0x7f00000019c0)=""/126, 0x7e, 0x3ff}, 0x1) [ 179.762401] FAULT_INJECTION: forcing a failure. [ 179.762401] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 179.774253] CPU: 0 PID: 12413 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 179.781625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.790987] Call Trace: [ 179.793589] dump_stack+0x1c9/0x2b4 [ 179.797237] ? dump_stack_print_info.cold.2+0x52/0x52 [ 179.802457] should_fail.cold.4+0xa/0x1a [ 179.806544] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 179.811669] ? trace_hardirqs_on+0x10/0x10 [ 179.815918] ? check_same_owner+0x340/0x340 [ 179.820261] ? find_held_lock+0x36/0x1c0 [ 179.824377] ? lock_downgrade+0x8f0/0x8f0 [ 179.828541] ? add_page_wait_queue+0x2c0/0x2c0 [ 179.833137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.838686] ? should_fail+0x223/0xbed [ 179.842594] __alloc_pages_nodemask+0x36e/0xdb0 [ 179.847276] ? up_write+0x7b/0x220 [ 179.850833] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 179.855854] ? __generic_file_write_iter+0x1bd/0x630 [ 179.860964] ? find_held_lock+0x36/0x1c0 [ 179.865050] ? check_same_owner+0x340/0x340 [ 179.869455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.875582] cache_grow_begin+0x91/0x710 [ 179.879648] kmem_cache_alloc+0x689/0x760 [ 179.883800] getname_flags+0xd0/0x5a0 [ 179.887605] ? __sb_end_write+0xac/0xe0 [ 179.891597] getname+0x19/0x20 [ 179.894779] do_sys_open+0x3a2/0x760 [ 179.898493] ? filp_open+0x80/0x80 [ 179.902037] ? do_sys_ftruncate+0x44e/0x560 [ 179.906350] __x64_sys_open+0x7e/0xc0 [ 179.910180] do_syscall_64+0x1b9/0x820 [ 179.914058] ? finish_task_switch+0x1d3/0x870 [ 179.918549] ? syscall_return_slowpath+0x5e0/0x5e0 [ 179.923470] ? syscall_return_slowpath+0x31d/0x5e0 [ 179.928407] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 179.933777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 179.938622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.943800] RIP: 0033:0x410081 00:54:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5451, &(0x7f0000000080)) 00:54:55 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) [ 179.946972] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 179.966318] RSP: 002b:00007fc8fe85da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 179.974042] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000410081 [ 179.981299] RDX: 00007fc8fe85dafa RSI: 0000000000000002 RDI: 00007fc8fe85daf0 [ 179.988558] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 179.995818] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 180.003075] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000007 00:54:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:55 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227c, &(0x7f0000000080)) [ 180.172598] jfs: Unrecognized mount option "dis" or missing value [ 180.207415] IPVS: ftp: loaded support on port[0] = 21 00:54:56 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xb03d30) 00:54:56 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2287, &(0x7f0000000080)) 00:54:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:56 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 180.502972] FAULT_INJECTION: forcing a failure. [ 180.502972] name failslab, interval 1, probability 0, space 0, times 0 [ 180.514459] CPU: 1 PID: 12483 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 180.521830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.531190] Call Trace: [ 180.533792] dump_stack+0x1c9/0x2b4 [ 180.537435] ? dump_stack_print_info.cold.2+0x52/0x52 [ 180.542652] should_fail.cold.4+0xa/0x1a [ 180.546730] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 180.551847] ? trace_hardirqs_on+0x10/0x10 [ 180.556098] ? do_writepages+0x1a0/0x1a0 [ 180.560179] ? set_page_dirty+0x36f/0x6f0 [ 180.564360] ? find_held_lock+0x36/0x1c0 [ 180.568466] ? check_same_owner+0x340/0x340 [ 180.572809] ? rcu_note_context_switch+0x730/0x730 [ 180.577755] ? graph_lock+0x170/0x170 [ 180.581577] __should_failslab+0x124/0x180 [ 180.585827] should_failslab+0x9/0x14 [ 180.589643] kmem_cache_alloc+0x2af/0x760 [ 180.593812] ? trace_hardirqs_on+0x10/0x10 [ 180.598060] ? find_held_lock+0x36/0x1c0 00:54:56 executing program 6: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x5386, &(0x7f0000000080)) 00:54:56 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x7ce0c0) [ 180.602319] get_empty_filp+0x12d/0x530 [ 180.606313] ? proc_nr_files+0x60/0x60 [ 180.610219] ? lock_downgrade+0x8f0/0x8f0 [ 180.614384] ? graph_lock+0x170/0x170 [ 180.618195] ? kasan_check_read+0x11/0x20 [ 180.622349] ? rcu_is_watching+0x8c/0x150 [ 180.626506] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 180.630937] path_openat+0x11e/0x4e10 [ 180.634760] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 180.639796] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 180.644571] ? find_held_lock+0x36/0x1c0 [ 180.648683] ? lock_downgrade+0x8f0/0x8f0 [ 180.652834] ? do_sys_open+0x3a2/0x760 [ 180.656722] ? kasan_check_read+0x11/0x20 [ 180.660887] ? do_raw_spin_unlock+0xa7/0x2f0 [ 180.665319] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 180.669905] ? __lock_is_held+0xb5/0x140 [ 180.673966] ? _raw_spin_unlock+0x22/0x30 [ 180.678115] ? __alloc_fd+0x34e/0x710 [ 180.681933] ? usercopy_warn+0x120/0x120 [ 180.685998] do_filp_open+0x255/0x380 [ 180.689793] ? may_open_dev+0x100/0x100 [ 180.693766] ? strncpy_from_user+0x3be/0x510 [ 180.698176] ? mpi_free.cold.1+0x19/0x19 [ 180.703138] ? get_unused_fd_flags+0x122/0x1a0 [ 180.707723] ? getname_flags+0x26e/0x5a0 [ 180.711772] ? __sb_end_write+0xac/0xe0 [ 180.715755] do_sys_open+0x584/0x760 [ 180.719479] ? filp_open+0x80/0x80 [ 180.723032] ? do_sys_ftruncate+0x44e/0x560 [ 180.727350] __x64_sys_open+0x7e/0xc0 [ 180.731142] do_syscall_64+0x1b9/0x820 [ 180.735020] ? syscall_slow_exit_work+0x500/0x500 [ 180.739857] ? syscall_return_slowpath+0x5e0/0x5e0 [ 180.744784] ? syscall_return_slowpath+0x31d/0x5e0 [ 180.749714] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 180.755087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 180.759937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.765113] RIP: 0033:0x410081 [ 180.768288] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 180.787495] RSP: 002b:00007fc8fe85da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 180.795202] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000410081 [ 180.802477] RDX: 00007fc8fe85dafa RSI: 0000000000000002 RDI: 00007fc8fe85daf0 [ 180.809752] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 180.817028] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 180.824298] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000008 00:54:56 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:56 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:56 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2275, &(0x7f0000000080)) 00:54:56 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)={0x0, 0x0}) rt_tgsigqueueinfo(r0, r1, 0x35, &(0x7f0000000100)={0x3d, 0x80, 0x8, 0x3ff}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x214180, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r2, 0x7403, &(0x7f0000000240)="6d5e2dc911c4511045ae75335e624c80004ce86f5755df2a858c4c7fd90e27f3a52c325e56cb8056f12d7a04223e920efea0bd3ad189981294abc85bea93201a8b984d953f4ea0d15fe9eb18b9bb294012d56abc5f4f13b3a6a734fe03271cf500d6e25f78d0d7142a6091a0f3b938caaab1338e62a94fc8fca884bee5704f1a6b5908ac7adc65c79d00354ca8199cf0bcf1db4cafd6e8f79580b8f8b85de2bde7996c9a92e34179a14a3614d7889d83b8450b9fb14421493c002fca08dc0ad10dc665f148be28a1e8f2f006101b9ac9a2255234a2b160fc6ec0c5d465ff597f6b2e9a4316d6de6fc18a98588522372f8dabf0c4f2ccebad01dbddddf17710a2408946") [ 181.045700] FAULT_INJECTION: forcing a failure. [ 181.045700] name failslab, interval 1, probability 0, space 0, times 0 [ 181.057436] CPU: 1 PID: 12512 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 181.064826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.074446] Call Trace: [ 181.077053] dump_stack+0x1c9/0x2b4 [ 181.080700] ? dump_stack_print_info.cold.2+0x52/0x52 [ 181.085924] should_fail.cold.4+0xa/0x1a [ 181.090004] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 181.095124] ? lock_release+0xa30/0xa30 [ 181.099114] ? check_same_owner+0x340/0x340 [ 181.103447] ? graph_lock+0x170/0x170 [ 181.107262] ? rcu_note_context_switch+0x730/0x730 [ 181.112208] ? find_held_lock+0x36/0x1c0 [ 181.116287] ? __lock_is_held+0xb5/0x140 [ 181.120368] ? check_same_owner+0x340/0x340 [ 181.124704] ? rcu_note_context_switch+0x730/0x730 [ 181.129648] __should_failslab+0x124/0x180 [ 181.133916] should_failslab+0x9/0x14 [ 181.137746] kmem_cache_alloc_trace+0x2cb/0x780 [ 181.142423] ? init_wait_entry+0x1c0/0x1c0 [ 181.146686] ? loop_get_status64+0x140/0x140 [ 181.151103] __kthread_create_on_node+0x127/0x4c0 [ 181.155957] ? __kthread_parkme+0x1b0/0x1b0 [ 181.160302] ? __lockdep_init_map+0x105/0x590 [ 181.164811] ? loop_get_status64+0x140/0x140 [ 181.169248] kthread_create_on_node+0xb1/0xe0 [ 181.173752] ? __kthread_create_on_node+0x4c0/0x4c0 [ 181.178782] ? kasan_check_read+0x11/0x20 [ 181.182939] lo_ioctl+0x7ce/0x1d10 [ 181.186481] ? lo_rw_aio_complete+0x450/0x450 [ 181.190973] blkdev_ioctl+0x9cd/0x2030 [ 181.194900] ? blkpg_ioctl+0xc40/0xc40 [ 181.198786] ? lock_downgrade+0x8f0/0x8f0 [ 181.202929] ? kasan_check_read+0x11/0x20 [ 181.207064] ? rcu_is_watching+0x8c/0x150 [ 181.211198] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 181.215626] ? __fget+0x414/0x670 [ 181.219076] ? expand_files.part.8+0x9c0/0x9c0 [ 181.223669] block_ioctl+0xee/0x130 [ 181.227287] ? blkdev_fallocate+0x400/0x400 [ 181.231595] do_vfs_ioctl+0x1de/0x1720 [ 181.235470] ? rcu_is_watching+0x8c/0x150 [ 181.239782] ? ioctl_preallocate+0x300/0x300 [ 181.244175] ? __fget_light+0x2f7/0x440 [ 181.248151] ? fget_raw+0x20/0x20 [ 181.251596] ? putname+0xf2/0x130 [ 181.255042] ? rcu_read_lock_sched_held+0x108/0x120 [ 181.260051] ? kmem_cache_free+0x25c/0x2d0 [ 181.264277] ? putname+0xf7/0x130 [ 181.267720] ? do_sys_open+0x3cb/0x760 [ 181.271611] ? security_file_ioctl+0x94/0xc0 [ 181.276017] ksys_ioctl+0xa9/0xd0 [ 181.279465] __x64_sys_ioctl+0x73/0xb0 [ 181.283345] do_syscall_64+0x1b9/0x820 [ 181.287219] ? finish_task_switch+0x1d3/0x870 [ 181.291717] ? syscall_return_slowpath+0x5e0/0x5e0 [ 181.296637] ? syscall_return_slowpath+0x31d/0x5e0 [ 181.301573] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 181.306931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 181.311770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.316950] RIP: 0033:0x455c97 [ 181.320123] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.339453] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:54:57 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x8dff90) [ 181.347153] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000455c97 [ 181.354409] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 181.361677] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 181.368936] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 181.376192] R13: 0000000000000001 R14: 00000000004d3e38 R15: 0000000000000009 00:54:57 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:57 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4200, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = getgid() getresgid(&(0x7f0000000080), &(0x7f0000000100)=0x0, &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r3, r4, r5) [ 181.505889] IPVS: ftp: loaded support on port[0] = 21 00:54:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:57 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) timer_create(0x3, &(0x7f0000000080)={0x0, 0x2b, 0x0, @thr={&(0x7f0000000400)="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", &(0x7f0000000040)}}, &(0x7f0000000100)=0x0) clock_gettime(0x4000000000007, &(0x7f00000002c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r6, 0x4008af13, &(0x7f0000000300)={0x2, 0x2}) r7 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x351, 0x202002) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) timer_settime(r1, 0x0, &(0x7f00000001c0)={{r2, r3+30000000}, {r4, r5+10000000}}, &(0x7f0000000200)) 00:54:57 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1b30f0) 00:54:57 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:57 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 181.794646] FAULT_INJECTION: forcing a failure. [ 181.794646] name failslab, interval 1, probability 0, space 0, times 0 [ 181.806064] CPU: 0 PID: 12578 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 181.813436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.822799] Call Trace: [ 181.825408] dump_stack+0x1c9/0x2b4 [ 181.829062] ? dump_stack_print_info.cold.2+0x52/0x52 [ 181.834288] should_fail.cold.4+0xa/0x1a [ 181.838377] ? print_usage_bug+0xc0/0xc0 [ 181.842471] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 181.847600] ? graph_lock+0x170/0x170 [ 181.851424] ? find_held_lock+0x36/0x1c0 [ 181.855503] ? __lock_is_held+0xb5/0x140 [ 181.859590] ? check_same_owner+0x340/0x340 [ 181.863926] ? rcu_note_context_switch+0x730/0x730 [ 181.868875] __should_failslab+0x124/0x180 [ 181.873891] should_failslab+0x9/0x14 [ 181.877703] kmem_cache_alloc+0x2af/0x760 [ 181.881873] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 181.886932] __kernfs_new_node+0xef/0x5a0 [ 181.891097] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 181.895867] ? lock_downgrade+0x8f0/0x8f0 [ 181.900031] ? lock_release+0xa30/0xa30 [ 181.904026] ? lock_downgrade+0x8f0/0x8f0 [ 181.908177] kernfs_new_node+0x80/0xf0 [ 181.912059] kernfs_create_dir_ns+0x3d/0x140 [ 181.916486] internal_create_group+0x110/0x970 [ 181.921064] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 181.926079] sysfs_create_group+0x1f/0x30 [ 181.930217] lo_ioctl+0x12c8/0x1d10 [ 181.933839] ? lo_rw_aio_complete+0x450/0x450 [ 181.938337] blkdev_ioctl+0x9cd/0x2030 [ 181.942218] ? blkpg_ioctl+0xc40/0xc40 [ 181.946100] ? lock_downgrade+0x8f0/0x8f0 [ 181.950244] ? rcu_is_watching+0x8c/0x150 [ 181.954383] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 181.958791] ? __fget+0x414/0x670 [ 181.962253] ? expand_files.part.8+0x9c0/0x9c0 [ 181.966837] block_ioctl+0xee/0x130 [ 181.970468] ? blkdev_fallocate+0x400/0x400 [ 181.974781] do_vfs_ioctl+0x1de/0x1720 [ 181.978658] ? rcu_is_watching+0x8c/0x150 [ 181.982797] ? ioctl_preallocate+0x300/0x300 [ 181.987194] ? __fget_light+0x2f7/0x440 [ 181.991170] ? fget_raw+0x20/0x20 [ 181.994611] ? putname+0xf2/0x130 [ 181.998059] ? rcu_read_lock_sched_held+0x108/0x120 [ 182.003068] ? kmem_cache_free+0x25c/0x2d0 [ 182.007296] ? putname+0xf7/0x130 [ 182.010744] ? do_sys_open+0x3cb/0x760 [ 182.014625] ? security_file_ioctl+0x94/0xc0 [ 182.019047] ksys_ioctl+0xa9/0xd0 [ 182.022501] __x64_sys_ioctl+0x73/0xb0 [ 182.026398] do_syscall_64+0x1b9/0x820 [ 182.030373] ? finish_task_switch+0x1d3/0x870 [ 182.034859] ? syscall_return_slowpath+0x5e0/0x5e0 [ 182.039780] ? syscall_return_slowpath+0x31d/0x5e0 [ 182.044708] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 182.050068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.054931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.060112] RIP: 0033:0x455c97 [ 182.063285] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.082634] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 00:54:57 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x3e7060) [ 182.090423] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000455c97 [ 182.097694] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 182.104951] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 182.112206] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 182.119471] R13: 0000000000000001 R14: 00000000004d3e38 R15: 000000000000000a 00:54:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:57 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2289, &(0x7f0000000080)) 00:54:58 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:58 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfse', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xcb6e20) 00:54:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 182.370892] IPVS: ftp: loaded support on port[0] = 21 00:54:58 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x20000) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_robust_list(&(0x7f0000000180)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x100000000, &(0x7f0000000140)={&(0x7f0000000100)}}, 0x18) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227f, &(0x7f0000000080)) 00:54:58 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:54:58 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) timer_create(0x3, &(0x7f0000000080)={0x0, 0x2b, 0x0, @thr={&(0x7f0000000400)="5a7f93d323a0a9d653d80fbf36ee198c6654fcf3c33393b394ffe5ef4568a5bcfd3f218b078284a8871c36c565339f77682c9e32341ff4a91a0d2bb8ec595ec9b00fc35ca1e4fd58ae58f358e4eed98b2bcdeb4a895e3a4719b659b9aa7bf01a1ef8a8ed9b62981871a61ab9efd1cb60c6116fbd0b9d6baad3d48bdc29bf3a32cb916fc69220dd6d2b9482f69cb43a66901408eb48d6875ff69ae66549aaef386b04db2adee0f58511276a27bfa2d85444a8dc512fecde4b4f318c0d6f830776f5c966f727dce8b76b8cc7992d206827dd46bbb9fcdb807a10485aa65cb560e6c7d0b67112504cfd0face631189cac756f0aeec081893206e96108c3c333b1abb5abb5f60fd4f365ee68cac20f5035704d3193be33b5419c8f8ca2b9706a7d7c36b51cf89c47f27923e41a51484d141f986306be8b3dcf2dc2230df2b740804e4d502433b2ed17ac06fcca125259f4f1acf28965a7d7f8d5e14cdbab9df08d8bd04c16274bb82842242488677f0f6d39d9479a91e08b69a9340b6fbddf42056e11260dde7ed171d0aa2c53f60bc3035108aa0131512a78629063c310a28d782c337cc109c626b478d6073c27ef8f3f55ad2bab60d7758ecfd21ed3e4a6df9c36fd282faf68d34181f43508ab275603624ecb39f009dfaea219535f2d211ce7755f33a3cd303a49ab3239ee2c2836f29bb12d5ee96d2d1ca20ccf4d080921f8e4fa6b59b119408de5b9e8a998260ef61cbce1523bee99c57b094803dc2b976f415a7e955cab02fe2f0da2c93d8ebfe3b8f2e566ef57b06c27053bf7eb0dd762b7db6823ded8d86c07f47312d6e803a617519eb8c52814b46380c83638e84ad54e703fc5ad0650ad4cadf00b129ab67cf4dfcd3fd95bde6cbd420a13cecf24cc6b79fad2a2136534f0c56bd0d4f17fb96e9baf5942fe727a8cddd5e53f50698cb461cc07a2154f8327ba83bba8fe7b18a4f91ec74b68006dce2f30c0e6a3dfaa5e4d561946c36f8eff75ecd8c3b5713f62486de53a4dd47e15558011316b6289cff4bd92cc10e74cda369c4afbe25b837889671eeba3b79a3f46199e38d7176e5ea08c583dca62b22eca77f60caae2753c8dd6bc899df88bdd1646f5181c2d84ebe522d87918d6513007d1e231fd94bf4c87163791372b7c0e78684926f2efa5aa89a8577940a4ae7cd4ec6d0f88b94dd1c1c928a5680bdf5568fd37d50999af5bc30794c8991b7aa2cb4b8a45881eba238004fef96248ed3dd850aa7c7c1732b3aafcc6dc214d5790a25d5b5c1ce44464cf80b85edfe392f614d35d881571ce07bfbfe20b2f151e8189a8e83799445b38a6ea32ae790d246474962f58988c06e8f00f461204914392f2b8983ff6111983a5e7e8fad22c18c20ae5aab806bbdf5088554b630bbea42841a8771df46eb39179f5eee3f78949dc3dfaaded885b88b6f54b71e5125830714782418ec8176c1c8a4bed2fb25831854d9e5b9ceb46197364bd86255ddf7980121ff11d6f2090d3b71f13e158c6796b8467fe034de5091f7f2ae368cc80d7af486695725ce58b57d8e792c4a65d47bb4b21f47630809e483d1b7b42e6f5f0983e12955de4ffb56b3c154383625f9684ebcf28b6ddf85f15a11660a9fb6177fbdfa18e393b60d0259810eb1d8c8d755dcb994869347e9b1fcdf35e91374cea866a26a9458bbb891fa578850b20e3789f49bfe0d0826f92cb786c9839ff275ad2557fa9c90f1580e6b630e9a2f1704f869c06876764c27c927d7889fb5f061dde2edbba9b37bf297a00e29749d5854b82fd27e8c7868023145e809803337ab00460f9a2ab68a1ff82d5bc96d9e67f2660a10769e46d7275ba72a392b09f4158a7712561110d2ba961e04af7d3fadbf4cf0124505c7ff8ef85904aec24c8a5a1af08ce63e05fd15d93879e16872066c01dc8e79f6d8aca442be430255c27598b1132412d9f59a6bc2b1ffaa4193b72d207de332ab28b69eb9b8e158f5b5ab48f9e55cd00254a9c44e62bd9a797d5786fef6329c78129e10b59cef0892bc23b09494938a9d02281505ce9f698c79d16a15384a2fcb3df3b174c273a411f269a8544ead30569ee3c9213d07765fb81ed64322200fc26e142c82be27c0c0bef4900f1e3f862a34ca9274c1236d669dff1fd31b28b63cf0c06c7e93ae3edc65ff406d42be55f810be2b9caff912f121157df249a8f513b376f8af0921cce9b6b2a1219183a4660f687f51ba15b9e64ddb804628d1cde68cded7c31b72cae03929f033677784145cb338a697b7f2ee3ad1282deaab5bbec3be88752def88328e051d707a00a756784f7e6ce77d160d7b559ded9af8edd19e6721a21e8a52001f8b5f3e526cf519ad21b3ca3bba2f7e722d31f140553d14e0b54bcc4110f417418ac28b856f89c2367b438e34061b430890af7556a3eafda51c0ca8e7764397ebc8eaee06519ffe0b395a754616abda37ebd1f71131289e2614d5133293120615cf8e844d3b1393786b167613bcd9a999965a6cc8b2c629722e7c8f43f71c80eb5c97868585bd1ef8b95256c61bfee0eaad89350940bb6e1f09eae323697ca2f396c2a34a444596150b85640217bbec00bbab0af1f9fa2ab23731973932a56fd6bfa97323e48b71628f7687c144f768489dd21015d603fc7c6ee48e8ea1383615e5e16e2d74d60248d3b6a5d0f75d26aa806b1790f0aefe3d9fab15972098200190d0150ff11a0eb448fd4fb6ce0781adced84f409772cd192c2a1cdeda7c6bf8dc38327e36834311f69e74362289762dad8caf19ff56527eeabdf1c1465bedc89141b299698dd08800dece9881c7d74f18f958d1490cc8a499e303669f0c517580e5b743f1338d37fa6347d0cd1c9f5dacce74c6e9b326219920b3651c5f95cd5a3aff00534fc84197344b2ebd7386524571dfc0a540fb12ba3e14ca6a2df15a9301c7d239975a41d82b17ea99c924b1c9e9e4d34a06a3ba319e338bc2d87ae090cab93a88243ee544abf2ca96a9436ee682c49bea218c41cefe0a3600116d67890b24ce7bce14baa7fb947791a2595b93d83b17229889894182bfc7ade103d94ba20cab3556ae56acf1553b4106e5fb81d708e6cdd796dd9c1c18b281ae40bb9e024fc6c4abcf7041c2c1c4c1b8a73d20fa22ddc9e557019a7bcc63be65177b3b2e06afb155cea1ed47957ed753d733567eecbb873b2c37b9b2fd58ea81d7629e474bc5d652a9fa68642ebd860d8e8ea772261c8106243283b6a468c4e45e1a202843d440bbf991751754c9706f58266ccf81a2eb40e4e45e301bb172456f5f3d33783160935c246d2f843b763465dd2c8a13090ad7cd6f26fb6dbafc9feee4304e372fe6ed8f0ed0b7a1f0657c72014b0d837bf0a1966d61d3ffe9d7178490067d084a58f92a35a425b41634f10c0ae0ce046589d9dd2e958b2efde43495f01e37227f5cb8bd951eb584c78389e1cf8446a3f6a55018d588442a97e0b0ed9594f4fafd624f4a164423ed5da9e9f6de9dbe1825cac1283e64c051730d07ce9d2e8f17a7a3dc3e2ab8405cb3c0e51fa7e652bef74eaf835e4d02deb607075568137b8eddc585ff7524f969cb607c2fa64aed87d348936bd6147532f929e2065ac6e9f05cafc4281ac0f7ecd6e24b11fba6cf42433aa32ad44f76d8ab155e27f9782f68eb20cbc8f5c32cc8ad89598478489614b13e2947f61760861347d7b9e6b2e3ce143c881fb7c26ecc2ac78bfd8ba2b51510d30d1f182f841cce400b49dc3c3a0dd6bbc8e33d91acf2ad6d6d79da01d63dbd9b441bd473c8f01e34264b9f0cb8904e0cd41bb549bd65b8c718f65fd9f30a7c85f062ef23423157a00e7a729a3d812c2ae4455d818b0eb131241fc4285990e51efe8109144e59ed6f07417fd9b27c83e3ef7bc03a0947f3156653527559a64a403d558fad7817fa94d4be5b59e2fdf45dfd06304fa23e2fccfcf2d74f1c524ca56c638b813dbbfb69a127cdb89ab44c7f1813bd98e64a04b1d12f2754e9b7ca41f6c5b2968d5bab3c09c64d19ad7ef398f955181be4e5bffefc918e7854dae0264d0372a8b085b32f50cc22bf945beb03e813a05a362e1c20c6566168d8f04f1a50ca937e76c7911f15a61db3f69965ccccae843f844d8d2da831a69bcddcf927a0ad416dbd6e74f2dcbcb70d8a07ae40e7687903f7f46652aa0378192fb1ab15ca4342a0b7786258a60d36ae1122e16a150f4396d532a6c4220fb5701da981cdc141a7217164e5d8c5c416413093e9ee4924353ec8649eee6b12323dee28065dc10e114b58f73c27ab567199a7d902f2fdc26435323f9b74769432a1fde9a35466d29e746a4a2ed0aa9287dc3a09c49bef82b7af6e8b55d5507fc57bc0b07f0da746888dfa59571c707e4db67c816b9680218e02e3412c804ba1ac9fd8a4cda32c57a21afaaafcb74464a4f9f722a07615b2387c127be63f5f0717104777948e7fbe38259d3f57fe37211d4b5935a013427b8b8b6b4db9ec21114cecf639c408f7a0fe0b182f62eb55a1b9d5f4a90db4f096607e365ae7ce8755054d124b45c798ed7fe99a1b4c3e1c80b65be733fe23257215a17ce23ffe5631bfebb32205fe792d3ec7a3a382a20dfe4bff7df4655ab0fee354242ed243529fd5ec7eee2f2dfa1da7fe2ee6a8c52a0a1eeade2c24ea797657deb111ce452e0b307494145ef365dcf5b67699efa9fef92e70231a148799c45419832b8b42e07ebae16d2f28b32cf89706095bfa6d26d05977f854945e89677081c5ed7ebd7fd2e3976cb6c198fc0fdef61adde5f14ea6fb9f9dccf2bab96ca754591a77e9ba2ba3b15c43d81ce9a14376280de587572cbfa1c483e6bca23d571e7fa1e1391d6e7607031377a6e9050218e70689b3a27e3afa5bf9d2cd5e0fbcd2e0c82e5f7ce41a0eb0e4cf5ac8734f20f3e98a489aba14a9a90d5f2deb3937b607a64c02947de99f5c365e4efdc8f08c791df1559473f5a68518fed29d0d5cb30530c13ae3b48a09cc772c05f7f26c90b29911af0009ad5ff42d3f169663219ff2954942c8a2233eac7941ef2dbc270f47136a645254b94197857e6402b973daf91d6e01a9b4694c29a4d7d5c940e5d58e6904510706bffb85570d61e752276f6aa83a657f691e37affeb2656c9aa2c988f2151a13e17c8b606fb9cf6b60451135a6525c858148e9893111699d47d1119e77fb128c41f7edcb20dfc7af9150b1f18de345f72c98805243918df32abb4177c6be61a75b24e2987eb9f7c86707e56a1396d5654f1e139f19ad0f15002ab78ded8f62c411de0131516ae51cf0ef61acda18e94fa1ca5c114d8bceec236ed4e56fa47333b1c942c4fc4990ca89445bca32fa2276d150ebe05921e6738b0864e2782c26dc9d9a8eb2ca2c1cac687092ebaa67a9041556cf9b49f4c7f4164cbbab3ec355d37efe0a729aac6761436da3e18701b0a602306c739d73f7913171277e8bcf7c0ff5a3e7409eff88c4ac951a0460bc56f0dcf33ed9b474f78f8f405646136d647f9e53ec63c4d93bebb46963db57473325545600afcf631f9c5116bbab15404155b4016bf39db8bb2df161544d29caeb913723650cf3e3fcc036a75a1dfbeb1a26509480d4f6a21af563bc712ee6842e349af281a96a17a5f7975d12c34004e57c50eeabe091d4566bcc5473d1f5c7499e77d32a55197e44865067177f925170060f439eeff7fa2dfc4341de76c6a8b1e1b9b8dc663c932295cc923b6253e69c90b1dbbce5c3168ff6305de93d00d7990af6ac4b738224f48ffb99648c75e", &(0x7f0000000040)}}, &(0x7f0000000100)=0x0) clock_gettime(0x4000000000007, &(0x7f00000002c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r6, 0x4008af13, &(0x7f0000000300)={0x2, 0x2}) r7 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x351, 0x202002) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000240)=0xc) timer_settime(r1, 0x0, &(0x7f00000001c0)={{r2, r3+30000000}, {r4, r5+10000000}}, &(0x7f0000000200)) [ 182.874754] IPVS: ftp: loaded support on port[0] = 21 00:54:58 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1275, &(0x7f0000000080)) 00:54:58 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xc66510) 00:54:58 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0xa0080, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000080)={0x9, 0x8}) 00:54:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2287, &(0x7f0000000080)) [ 183.074494] FAULT_INJECTION: forcing a failure. [ 183.074494] name failslab, interval 1, probability 0, space 0, times 0 [ 183.085835] CPU: 1 PID: 12685 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 183.093202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.102565] Call Trace: [ 183.105178] dump_stack+0x1c9/0x2b4 [ 183.108823] ? dump_stack_print_info.cold.2+0x52/0x52 [ 183.114041] should_fail.cold.4+0xa/0x1a [ 183.118122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 183.123331] ? mutex_trylock+0x2b0/0x2b0 [ 183.127407] ? graph_lock+0x170/0x170 [ 183.131216] ? ___ratelimit.cold.2+0x6b/0x6b [ 183.135633] ? save_stack+0x43/0xd0 [ 183.139278] ? find_held_lock+0x36/0x1c0 [ 183.143357] ? __lock_is_held+0xb5/0x140 [ 183.147441] ? check_same_owner+0x340/0x340 [ 183.151773] ? rcu_note_context_switch+0x730/0x730 [ 183.156722] __should_failslab+0x124/0x180 [ 183.160972] should_failslab+0x9/0x14 [ 183.164782] kmem_cache_alloc+0x2af/0x760 [ 183.168942] ? wait_for_completion+0x8d0/0x8d0 [ 183.173538] ? graph_lock+0x170/0x170 [ 183.177354] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 183.182392] __kernfs_new_node+0xef/0x5a0 [ 183.186560] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 183.191339] ? mutex_unlock+0xd/0x10 [ 183.195078] ? kernfs_activate+0x21a/0x2c0 [ 183.199336] kernfs_new_node+0x80/0xf0 [ 183.203246] __kernfs_create_file+0x4d/0x330 [ 183.207675] sysfs_add_file_mode_ns+0x21a/0x560 [ 183.212373] internal_create_group+0x282/0x970 [ 183.216981] sysfs_create_group+0x1f/0x30 [ 183.221148] lo_ioctl+0x12c8/0x1d10 [ 183.224793] ? lo_rw_aio_complete+0x450/0x450 [ 183.229310] blkdev_ioctl+0x9cd/0x2030 [ 183.233212] ? blkpg_ioctl+0xc40/0xc40 [ 183.237117] ? lock_downgrade+0x8f0/0x8f0 [ 183.241288] ? rcu_is_watching+0x8c/0x150 [ 183.245453] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 183.249881] ? __fget+0x414/0x670 [ 183.253351] ? expand_files.part.8+0x9c0/0x9c0 [ 183.257953] block_ioctl+0xee/0x130 [ 183.261591] ? blkdev_fallocate+0x400/0x400 [ 183.265922] do_vfs_ioctl+0x1de/0x1720 [ 183.269817] ? rcu_is_watching+0x8c/0x150 [ 183.273978] ? ioctl_preallocate+0x300/0x300 [ 183.278397] ? __fget_light+0x2f7/0x440 [ 183.282373] ? fget_raw+0x20/0x20 [ 183.285833] ? putname+0xf2/0x130 [ 183.289291] ? rcu_read_lock_sched_held+0x108/0x120 [ 183.294311] ? kmem_cache_free+0x25c/0x2d0 [ 183.298550] ? putname+0xf7/0x130 [ 183.302001] ? do_sys_open+0x3cb/0x760 [ 183.305981] ? security_file_ioctl+0x94/0xc0 [ 183.310392] ksys_ioctl+0xa9/0xd0 [ 183.313848] __x64_sys_ioctl+0x73/0xb0 [ 183.317764] do_syscall_64+0x1b9/0x820 [ 183.321652] ? finish_task_switch+0x1d3/0x870 [ 183.326164] ? syscall_return_slowpath+0x5e0/0x5e0 [ 183.331096] ? syscall_return_slowpath+0x31d/0x5e0 [ 183.336031] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 183.341400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 183.346252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.351442] RIP: 0033:0x455c97 [ 183.354632] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:54:59 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x6601, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x18) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:54:59 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2272, &(0x7f0000000080)) [ 183.374005] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 183.381715] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000455c97 [ 183.388979] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 183.396244] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 183.403509] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 183.410774] R13: 0000000000000001 R14: 00000000004d3e38 R15: 000000000000000b 00:54:59 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x227e, &(0x7f0000000080)) 00:54:59 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8001, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000540)="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") 00:54:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/user\x00') r2 = dup2(r0, r1) fstatfs(r2, &(0x7f0000000040)=""/175) 00:54:59 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:59 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) [ 183.917726] IPVS: ftp: loaded support on port[0] = 21 00:54:59 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:59 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000001c0)=0x3ff, 0x4) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x67, "9c2397b8b85c363d5c78691cd6fbb4a66cf835e5843ff04a25357f455ba4bd6004cc16ccf135cb14eb332196927b94d29ff7e6c8788aaeabd67b77cf80a60a8ea9f3368c5faf02341759f0be88342238e6aabf7a0d1631e11627998d4d5cc78ab79798af8ee555"}, &(0x7f0000000080)=0x6f) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000200)={0x2, 0x10, [0xfffffffffffffff7, 0xd8, 0x89, 0x7]}) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0x0, 0xffffffffffff0001}, 0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x10) 00:54:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:54:59 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x81e9d0) 00:54:59 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2282, &(0x7f0000000040)="f33238848125a3dc75d0e07e9120b33f89db601328b308786074e8f44b5264bf760b") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) 00:54:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:54:59 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 184.135735] FAULT_INJECTION: forcing a failure. [ 184.135735] name failslab, interval 1, probability 0, space 0, times 0 [ 184.147201] CPU: 1 PID: 12809 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 184.154571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.163933] Call Trace: [ 184.166541] dump_stack+0x1c9/0x2b4 [ 184.170190] ? dump_stack_print_info.cold.2+0x52/0x52 [ 184.175396] ? __mutex_lock+0x7e8/0x1820 [ 184.179479] should_fail.cold.4+0xa/0x1a [ 184.183560] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 184.188684] ? graph_lock+0x170/0x170 [ 184.192504] ? find_held_lock+0x36/0x1c0 [ 184.196580] ? __lock_is_held+0xb5/0x140 [ 184.200668] ? check_same_owner+0x340/0x340 [ 184.204999] ? kasan_check_write+0x14/0x20 [ 184.209245] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 184.214182] ? rcu_note_context_switch+0x730/0x730 [ 184.219212] __should_failslab+0x124/0x180 [ 184.223464] should_failslab+0x9/0x14 [ 184.227268] kmem_cache_alloc+0x2af/0x760 [ 184.231427] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 184.236456] __kernfs_new_node+0xef/0x5a0 [ 184.240628] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 184.245394] ? mutex_unlock+0xd/0x10 [ 184.249112] ? kernfs_activate+0x21a/0x2c0 [ 184.253351] ? kernfs_walk_and_get_ns+0x340/0x340 [ 184.258204] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 184.263770] ? kernfs_link_sibling+0x1d2/0x3b0 [ 184.268366] kernfs_new_node+0x80/0xf0 [ 184.272259] __kernfs_create_file+0x4d/0x330 [ 184.276671] sysfs_add_file_mode_ns+0x21a/0x560 [ 184.281348] internal_create_group+0x282/0x970 [ 184.285942] sysfs_create_group+0x1f/0x30 [ 184.290093] lo_ioctl+0x12c8/0x1d10 [ 184.293726] ? lo_rw_aio_complete+0x450/0x450 [ 184.298224] blkdev_ioctl+0x9cd/0x2030 [ 184.302118] ? blkpg_ioctl+0xc40/0xc40 [ 184.306016] ? lock_downgrade+0x8f0/0x8f0 [ 184.310175] ? kasan_check_read+0x11/0x20 [ 184.314324] ? rcu_is_watching+0x8c/0x150 [ 184.318473] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 184.322889] ? __fget+0x414/0x670 [ 184.326353] ? expand_files.part.8+0x9c0/0x9c0 [ 184.330943] block_ioctl+0xee/0x130 [ 184.334572] ? blkdev_fallocate+0x400/0x400 [ 184.338891] do_vfs_ioctl+0x1de/0x1720 [ 184.342779] ? rcu_is_watching+0x8c/0x150 [ 184.346929] ? ioctl_preallocate+0x300/0x300 [ 184.351341] ? __fget_light+0x2f7/0x440 [ 184.355315] ? fget_raw+0x20/0x20 [ 184.358765] ? putname+0xf2/0x130 [ 184.362222] ? rcu_read_lock_sched_held+0x108/0x120 [ 184.367237] ? kmem_cache_free+0x25c/0x2d0 [ 184.371474] ? putname+0xf7/0x130 [ 184.374927] ? do_sys_open+0x3cb/0x760 [ 184.378817] ? security_file_ioctl+0x94/0xc0 [ 184.383226] ksys_ioctl+0xa9/0xd0 [ 184.386680] __x64_sys_ioctl+0x73/0xb0 [ 184.390572] do_syscall_64+0x1b9/0x820 [ 184.394461] ? finish_task_switch+0x1d3/0x870 [ 184.398960] ? syscall_return_slowpath+0x5e0/0x5e0 [ 184.403893] ? syscall_return_slowpath+0x31d/0x5e0 [ 184.408827] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 184.414194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 184.419044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.424233] RIP: 0033:0x455c97 [ 184.427415] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.446793] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 184.454507] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000455c97 [ 184.461780] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 184.469135] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 184.476404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 00:55:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:00 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000100)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000280)="d8d2b0371c8dcf79b5fcb6fe5e4ac992459991251cd8c034144e54e8b13c7db768985ef68fffcc654d7f9024642fb7d32fc32b21c6cc9c40fd47990effc42f68b1b17b9d1849b5e43b0a69842253cdb738c5303109b779f006ec2ccf5b6c96d7eda5890b093cc79787b4deb05ceaab1f7035ec9b239d45d5fa47f5564cd86c886803aed2adfb09455e676aa85b3783841aafe293b6e3a8c8039c3cc5ef8e70d9c354632da2f3c058b0330f9ce4d33450edba637f36f068bd9c91d0019abcaec1f9f989c1cb1ef240c5800d68e088ee86b26321aa4f3d9b000000000000000000000000") r1 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffff}, 0x111, 0x6}}, 0xffffffffffffffb4) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e23, 0xfffffffffffffff8, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x732}, r2}}, 0x38) ioctl$KVM_NMI(r1, 0xae9a) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000580)={@local, @loopback, 0x0}, &(0x7f00000005c0)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000600)={r3, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1f}}, 0x10) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) 00:55:00 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r2 = getgid() getgroups(0x8, &(0x7f0000000040)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0xee01, 0x0]) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x80000001) setresgid(r2, r3, r4) [ 184.483680] R13: 0000000000000001 R14: 00000000004d3e38 R15: 000000000000000c 00:55:00 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:00 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:00 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:00 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:00 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x401, 0x81) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000100)=""/90) [ 184.761754] FAULT_INJECTION: forcing a failure. [ 184.761754] name failslab, interval 1, probability 0, space 0, times 0 [ 184.773130] CPU: 0 PID: 12847 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 184.780783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.790152] Call Trace: [ 184.792759] dump_stack+0x1c9/0x2b4 [ 184.796432] ? dump_stack_print_info.cold.2+0x52/0x52 [ 184.801634] ? __mutex_lock+0x7e8/0x1820 [ 184.805722] should_fail.cold.4+0xa/0x1a [ 184.809807] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 184.814934] ? graph_lock+0x170/0x170 [ 184.818764] ? find_held_lock+0x36/0x1c0 [ 184.822853] ? __lock_is_held+0xb5/0x140 [ 184.826953] ? check_same_owner+0x340/0x340 [ 184.831287] ? kasan_check_write+0x14/0x20 [ 184.835535] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 184.840476] ? rcu_note_context_switch+0x730/0x730 [ 184.845420] __should_failslab+0x124/0x180 [ 184.849668] should_failslab+0x9/0x14 [ 184.853480] kmem_cache_alloc+0x2af/0x760 00:55:00 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x254310) 00:55:00 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 184.857640] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 184.862670] __kernfs_new_node+0xef/0x5a0 [ 184.866834] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 184.871600] ? mutex_unlock+0xd/0x10 [ 184.875322] ? kernfs_activate+0x21a/0x2c0 [ 184.879566] ? kernfs_walk_and_get_ns+0x340/0x340 [ 184.884433] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 184.889985] ? kernfs_link_sibling+0x1d2/0x3b0 [ 184.894590] kernfs_new_node+0x80/0xf0 [ 184.898490] __kernfs_create_file+0x4d/0x330 [ 184.902913] sysfs_add_file_mode_ns+0x21a/0x560 [ 184.907602] internal_create_group+0x282/0x970 00:55:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) [ 184.912204] sysfs_create_group+0x1f/0x30 [ 184.916363] lo_ioctl+0x12c8/0x1d10 [ 184.920004] ? lo_rw_aio_complete+0x450/0x450 [ 184.924532] blkdev_ioctl+0x9cd/0x2030 [ 184.928436] ? blkpg_ioctl+0xc40/0xc40 [ 184.932341] ? lock_downgrade+0x8f0/0x8f0 [ 184.936508] ? kasan_check_read+0x11/0x20 [ 184.940662] ? rcu_is_watching+0x8c/0x150 [ 184.944814] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 184.944820] IPVS: ftp: loaded support on port[0] = 21 [ 184.954401] ? __fget+0x414/0x670 [ 184.957852] ? expand_files.part.8+0x9c0/0x9c0 [ 184.962429] block_ioctl+0xee/0x130 [ 184.966044] ? blkdev_fallocate+0x400/0x400 [ 184.970356] do_vfs_ioctl+0x1de/0x1720 [ 184.974230] ? rcu_is_watching+0x8c/0x150 [ 184.978367] ? ioctl_preallocate+0x300/0x300 [ 184.982757] ? __fget_light+0x2f7/0x440 [ 184.986728] ? fget_raw+0x20/0x20 [ 184.990166] ? putname+0xf2/0x130 [ 184.993607] ? rcu_read_lock_sched_held+0x108/0x120 [ 184.998613] ? kmem_cache_free+0x25c/0x2d0 [ 185.002923] ? putname+0xf7/0x130 [ 185.006366] ? do_sys_open+0x3cb/0x760 [ 185.010253] ? security_file_ioctl+0x94/0xc0 [ 185.014652] ksys_ioctl+0xa9/0xd0 [ 185.018097] __x64_sys_ioctl+0x73/0xb0 [ 185.021975] do_syscall_64+0x1b9/0x820 [ 185.025849] ? finish_task_switch+0x1d3/0x870 [ 185.030333] ? syscall_return_slowpath+0x5e0/0x5e0 [ 185.035254] ? syscall_return_slowpath+0x31d/0x5e0 [ 185.040177] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 185.045538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 185.050458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.055645] RIP: 0033:0x455c97 [ 185.058815] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.078073] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.085779] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000455c97 [ 185.093033] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 185.100319] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 00:55:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 185.107572] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 185.114843] R13: 0000000000000001 R14: 00000000004d3e38 R15: 000000000000000d [ 185.187234] sd 0:0:1:0: device reset 00:55:01 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 185.228191] sd 0:0:1:0: device reset 00:55:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x3, 0x70, 0xb2, 0x361, 0x0, 0x4, 0x0, 0x8, 0x1000, 0x0, 0x7fff, 0x2653, 0x7, 0x1ff, 0x7f, 0xfbe1, 0x100000000, 0x1, 0xfffffffffffffeff, 0x1, 0x9, 0x5, 0x7, 0x3, 0x70, 0x100, 0x81, 0x1000, 0x3, 0x800, 0x1, 0x1, 0x5, 0x4, 0xffffffff00000000, 0x9, 0x0, 0xfff, 0x0, 0x20, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x13000, 0xfff, 0x0, 0x4, 0x9, 0xfffffffffffffa2f, 0x3f}) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 185.384122] FAULT_INJECTION: forcing a failure. [ 185.384122] name failslab, interval 1, probability 0, space 0, times 0 [ 185.395569] CPU: 1 PID: 12889 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 185.402962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.412322] Call Trace: [ 185.414926] dump_stack+0x1c9/0x2b4 [ 185.418574] ? dump_stack_print_info.cold.2+0x52/0x52 [ 185.423782] ? __mutex_lock+0x7e8/0x1820 [ 185.427865] should_fail.cold.4+0xa/0x1a [ 185.431948] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 185.437591] ? graph_lock+0x170/0x170 [ 185.441406] ? find_held_lock+0x36/0x1c0 [ 185.445477] ? __lock_is_held+0xb5/0x140 [ 185.449578] ? check_same_owner+0x340/0x340 [ 185.453898] ? kasan_check_write+0x14/0x20 [ 185.458136] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 185.463062] ? rcu_note_context_switch+0x730/0x730 [ 185.467990] __should_failslab+0x124/0x180 [ 185.472224] should_failslab+0x9/0x14 [ 185.476018] kmem_cache_alloc+0x2af/0x760 [ 185.480185] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 185.485199] __kernfs_new_node+0xef/0x5a0 [ 185.489340] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 185.494085] ? mutex_unlock+0xd/0x10 [ 185.497786] ? kernfs_activate+0x21a/0x2c0 [ 185.502037] ? kernfs_walk_and_get_ns+0x340/0x340 [ 185.506875] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 185.512406] ? kernfs_link_sibling+0x1d2/0x3b0 [ 185.516987] kernfs_new_node+0x80/0xf0 [ 185.520871] __kernfs_create_file+0x4d/0x330 [ 185.525283] sysfs_add_file_mode_ns+0x21a/0x560 [ 185.529948] internal_create_group+0x282/0x970 [ 185.534530] sysfs_create_group+0x1f/0x30 [ 185.538669] lo_ioctl+0x12c8/0x1d10 [ 185.542292] ? lo_rw_aio_complete+0x450/0x450 [ 185.546780] blkdev_ioctl+0x9cd/0x2030 [ 185.550662] ? blkpg_ioctl+0xc40/0xc40 [ 185.554546] ? lock_downgrade+0x8f0/0x8f0 [ 185.558692] ? kasan_check_read+0x11/0x20 [ 185.562827] ? rcu_is_watching+0x8c/0x150 [ 185.566965] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 185.571382] ? __fget+0x414/0x670 [ 185.574834] ? expand_files.part.8+0x9c0/0x9c0 [ 185.579414] block_ioctl+0xee/0x130 [ 185.583036] ? blkdev_fallocate+0x400/0x400 [ 185.587348] do_vfs_ioctl+0x1de/0x1720 [ 185.591237] ? rcu_is_watching+0x8c/0x150 [ 185.595392] ? ioctl_preallocate+0x300/0x300 [ 185.599809] ? __fget_light+0x2f7/0x440 [ 185.603773] ? fget_raw+0x20/0x20 [ 185.607216] ? putname+0xf2/0x130 [ 185.610657] ? rcu_read_lock_sched_held+0x108/0x120 [ 185.615662] ? kmem_cache_free+0x25c/0x2d0 [ 185.619889] ? putname+0xf7/0x130 [ 185.623343] ? do_sys_open+0x3cb/0x760 [ 185.627228] ? security_file_ioctl+0x94/0xc0 [ 185.631630] ksys_ioctl+0xa9/0xd0 [ 185.635075] __x64_sys_ioctl+0x73/0xb0 [ 185.638957] do_syscall_64+0x1b9/0x820 [ 185.642847] ? finish_task_switch+0x1d3/0x870 [ 185.647333] ? syscall_return_slowpath+0x5e0/0x5e0 [ 185.652265] ? syscall_return_slowpath+0x31d/0x5e0 [ 185.657191] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 185.662561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 185.667401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.672591] RIP: 0033:0x455c97 [ 185.675765] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.695122] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 185.702833] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000455c97 [ 185.710100] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 185.717358] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 185.724705] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 00:55:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) dup3(r0, r1, 0x0) 00:55:01 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x2, &(0x7f0000000040)="337807ac9d4e87edd54ffe6c6c49325a6e3d7443d8ef7cf2036612f96f7666ec6ddd8dff794ce0b9ab9e960ff1182e1fb3cdd8c2537cd65318f972be0d4374f838c30a3ebce9d93898d9605b5099") perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 185.731967] R13: 0000000000000001 R14: 00000000004d3e38 R15: 000000000000000e 00:55:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:01 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:01 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) dup3(r0, r1, 0x0) [ 185.869986] sd 0:0:1:0: device reset 00:55:01 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x3d6e90) 00:55:01 executing program 6: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8400, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000100)={[{0xffff, 0x7, 0x6, 0xd7a, 0x3, 0x800000000, 0x20, 0x7, 0xfc, 0x40, 0x26, 0x2, 0x3}, {0x6, 0x805c, 0x58e4, 0xfffffffffffffffe, 0x1ff, 0x3, 0x1f, 0x7794, 0x2, 0x3, 0xffffffff, 0x3, 0x2}, {0x0, 0x3f, 0x0, 0xea, 0x9, 0xe5c, 0x4, 0x0, 0xffff, 0x6, 0x8, 0x5, 0xffffffffffff0001}], 0xc5}) openat$cgroup_int(r0, &(0x7f0000000080)='io.bfq.weight\x00', 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:55:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) dup3(r0, r1, 0x0) [ 186.060297] IPVS: ftp: loaded support on port[0] = 21 00:55:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:01 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f3", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:01 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r1, 0x80000000, 0x18}, 0xfffffffffffffe28) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x100000001, 0x149200) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000000)='[:A]\ne:\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='ceph\x00', 0x0, &(0x7f00000001c0)) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x800, 0x1, 0x3, 0x81, 0x2, 0xaa, {0x0, @in6={{0xa, 0x4e23, 0xffff, @empty, 0x1}}, 0x100000000, 0x8001, 0x9, 0x0, 0x7f}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000400)={r3, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}}, &(0x7f0000000300)=0x84) 00:55:01 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x950c40) 00:55:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) [ 186.216572] libceph: parse_ips bad ip '[:A] [ 186.216572] e' [ 186.254151] sd 0:0:1:0: device reset [ 186.293618] libceph: parse_ips bad ip '[:A] [ 186.293618] e' 00:55:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:02 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:02 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100)=0x6, 0x4) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000080)={0x8000000000000000, 0x10000, 0x7, 0xf, 0xc}) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 00:55:02 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x75d410) 00:55:02 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) [ 186.775686] sd 0:0:1:0: device reset [ 186.794503] IPVS: ftp: loaded support on port[0] = 21 00:55:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:02 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:02 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x802, 0x8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x50000, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000140), 0x4) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 186.869230] sd 0:0:1:0: device reset 00:55:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, 0xffffffffffffffff, 0x0) 00:55:02 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xc46170) 00:55:03 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(0xffffffffffffffff, r0, 0x0) 00:55:03 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000100)={{0x5, 0x25a, 0x8, 0xe8a, 0x7ff, 0x5}, 0x7f, 0x2, 0x5, 0xf515, 0x3, "6a91949a39a23a3b67abe6059d52e55e71df2e18d36eecee908cd17bcf0f1e7faf4d8b85a98d5f8d53d630ae9b0be8a2b8403f73af197341c1a6952059dab45a067fa6b296d0d8c359586d0502c0ab83fd28a68a317cbb6398159f53c813522f1f053f18b9d7a56df90a662b3e25c88239cc6aafcaf71288c3e88c863bef9bb6"}) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:03 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x400000, 0x0) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x1, &(0x7f0000000100)="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") 00:55:03 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:03 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 187.564353] IPVS: ftp: loaded support on port[0] = 21 00:55:03 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xc3, 0x100000000) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x100) ioctl$RTC_PIE_ON(r1, 0x7005) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:03 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="10002cbd70ff00000000000000000000000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x48015) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r2, 0x2284, &(0x7f0000000080)) 00:55:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) [ 187.754219] sd 0:0:1:0: device reset 00:55:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 187.822217] sd 0:0:1:0: device reset 00:55:03 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xa42770) 00:55:03 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:03 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x79a2d975, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000080)=0x101, 0x8) 00:55:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:03 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x20100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000140)={0x7, 0x69}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x7, 0x0]}, 0x8) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x4abc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) [ 188.005918] sd 0:0:1:0: device reset [ 188.117622] sd 0:0:1:0: device reset [ 188.169250] sd 0:0:1:0: device reset 00:55:04 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:04 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x8000a, 0x3) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)="1470726f632f73636f6e6e7472d19176eac532f160d47acd08bc3c61636b0000b971d7195549a8d3cab362e60b213c3a7aefb725edeac42147f290dad1424656e92f33709239e9efabfece90d8892ada2db64ca2df637289c6f61a8d304b973208bc5258cb8555f9ec264015c13758753bc0efc6f4c5b98dea59b84632e60868445d22a8", 0x2, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000080)={0x77359400}, 0x10) ioctl(r0, 0x2284, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') 00:55:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:04 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000100)="6a0a10a6db98a9575ee5c988ecbfd07b17e26a6e0631fd3cde4b88374ee332951844100f863c7da5dbcf0330b6fad54f6dde355c0011200f98cbb93083477f6305974657ff713644f1438c7e7c4af67752fbc856876f911e9a9be32abdaa092adffdee381c68aceca94f6a00c4470adb85228e0e485a3f493ace9c2ddc3ff328276ae39112ec7b9cdd201cf5c80b1bae3f54c0325f64196e5957350de0ec55ce55bffc727ed11abfad3836e9145fdc31da283364b0b26a12a36dcb735950122e3f67961044ff82d41f3477bb271b7b211231a6f27d9fc12939ae7cde2ddf06fa") 00:55:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:04 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x559a10) 00:55:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:04 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f00000000c0)="154cdfccdac5bef862d20f779ac382fc8536eab44ee93774a8ebd4ce51e559cc40947b484c361dd598a96e8276191f01331e97ccb1efac2b68ed657fe399f75830f112f1") 00:55:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="62747266739b", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:04 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 188.623836] IPVS: ftp: loaded support on port[0] = 21 00:55:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:04 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000040), 0x4) r1 = open(&(0x7f0000000140)='./file0\x00', 0x20000, 0x0) getsockname(r1, &(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @random}}, &(0x7f0000000200)=0x80) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getuid() r3 = getgid() syz_fuse_mount(&(0x7f0000000240)='./file0\x00', 0x0, r2, r3, 0x4, 0x1000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000000440)={@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x17}}, r4}, 0x14) ioctl(r0, 0x2284, &(0x7f0000000100)="b5d750ca162cd544928728547ee2aabbd3830f16b05f21a16354000000000000000000000000") 00:55:05 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:05 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x400000) ioctl$BLKRRPART(r1, 0x125f, 0x0) 00:55:05 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xa52940) 00:55:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:05 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:05 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x183802, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@empty, @mcast2={0xff, 0x2, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x3, 0x0, 0x2, 0x0, 0x5, 0x100000, r2}) 00:55:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 189.479329] sd 0:0:1:0: device reset [ 189.500807] sd 0:0:1:0: device reset 00:55:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, r1, 0x0) 00:55:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:05 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x40000, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1000, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@version_u='version=9p2000.u', 0x2c}, {@common=@fscache='fscache', 0x2c}, {@rq={'rq', 0x3d, 0x2f6}, 0x2c}, {@rq={'rq', 0x3d, 0x5}, 0x2c}]}}) poll(&(0x7f0000000100)=[{r2, 0x4}, {r1, 0x100}, {r2, 0x100}], 0x3, 0x6) r3 = dup3(r1, r2, 0x80000) getsockopt$nfc_llcp(r3, 0x118, 0x1, &(0x7f0000000280)=""/162, 0xa2) ioctl(r0, 0x2284, &(0x7f0000000080)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000001400)='/dev/zero\x00', 0x200, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001440), &(0x7f0000001480)=0xc) 00:55:05 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:05 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000040)) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000080)) 00:55:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 189.713432] IPVS: ftp: loaded support on port[0] = 21 00:55:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x0) dup3(r0, r1, 0x0) 00:55:05 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) fadvise64(r0, 0x4, 0x400, 0x3) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x200}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e23, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x800}}, 0x7ff, 0xffff, 0xfc, 0x1, 0x6}, &(0x7f0000000200)=0x98) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:06 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x0, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x0) dup3(r0, r1, 0x0) 00:55:06 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="7b81f688c4c43314547458becdbfe12592b499dcb3a6b837d65ae0c78768a0f46716415e4bf84a566c148c5dddd6c6c87e273d4bad20879489cab262f95bb9c4830bf91800b73f7777f8a219ca62a392f569e05e345bc746b90c72be1a2b8a65c44120e0d732434a3f079c9d3a82c8a54a69605ecaf23e08df1bc146a234dd532083c546c7b31e23e69874b6b7b24821900060e44833261eb0847302214d5183148947e70ff15a985912005515f781f5a5f45579a8d88ba4aba1cef208d40017000ac35670dbb7e17414c6766ce2b4ffd7df208d62c3ddb0e263beae09498a5145449471754c3d4d7dfb0a4453793ad7fedc8f8bb0049a3cc2789c0ef53d908f0e821a2e23c155e42dae2b03b8b5481dc0186b7fd71ad22b5fe4127df496a2fe9d520774b649219360343f9706273d89e9b806beed39d12640d4c6a66d38406185d546e52392caac57776cc86edcef2ae229c4082b33fab00903a57b6cee0d5646c9cb2e3a3067d18c463177d323359e53ee3346eb511b0ca4cfef2387cb116e7daae58cd055a52a0a85a1286082000000e8f65ceadf06365c25f2309b93d8ac541b10c621f8d6fcb3b93a137ea4f83331b4dfad6bf503000ad114e06399592e54c2d9074472b1fb86203dcdc1001d6fd231ef44038b09267d643adb8f9a83e86b2b5a3379217ff715c06620fbef5acdb2564eb4070cca55fc482ae3d0781ea45735e24fd87940749d30eb7d3f44ca4ddb4c39337828d1ffad6d8aba727ce54d9fa992b229754538fa7cc857f7f9dd132792d8a2fcb0365879d0c9ae5255b827cf50489cf5fc0595992abb3ee15f898d7c0920614b9095e31a001fe8f2bb6351fe6abbbdca3906a09c35e0ba970d3e9855c559b41ed15626e778fdf94d4b76c66853fb1ca0cbc9aef421de2eea1f08ce9c7a0a09bfb6b0e36ba203cea8fa31c1c1e93451fa3dd8749a4998b84fd515a1529f847125ebeb150593d5fb5a20d9d5865138a5f333a92224f06a88971b4bd4940fcd405224a22a16e28e3115bc3649cfb67a226a213b8d9a7f86872c13ae0d30523a4b8d127b92f76ad65ea2f1954e232cfe273fabb76c24ef5142084295d5eeed4e10b8bc474b37f3a1c63421b9df1352b91be877ffb11f3bd04e98225e480b4db3db3d7bbb8acd6cf214944476d81e6be551dcd3af12e70480cd498e1830c4dd45852d850b88b0c74d7c93c58d38b97fc2d6aa6950ad4f99d839ba1e1a47637b5e515fc9d759a811eb2adc2b6d73d7eccb80f1a8ba0f2ca56637ca748b4b8d0ec1345d02509ff5d94470f896767f3a65e9e7f8e999daa873cd37c9590335663d55225f5184a13fc884c81f20625bd3c972a8a6c33eda484c7e261667c4a9c5aad804b662b05308b0c1c02ec226d176bd6f4f956d498b2072cd6d374b185b3c00d0e0c89b71451eb530211a05bf032840195b44640e2f4b317e54039a24c60302d96a1d43acc23e38d0b5db6170ea97c7f5938269b7ce6c75c162c752908b100396bca7f19e7c15591660e81c0bc97466812dfcbc72d04a348dee04ee12292f6d20ed5ea729ab5b12e8504668336f66a62c1dff6df9a8b89b448dc15e136985f2b33afe7b68fe1bda544bb6a06bb9f1f52e88c7a502d2d67069e323b93f9505b08fc731280034dff654b88d829c5a9bd5abb7316298e9c9b01826cf8224f2885bc734778eccb3dac75cc0f22caa029f21fb205b65f220d720831bd65db8b7212c7d9179fdea26524645cc728d2d2dfcc1c679cf7f11a475e6dfacdf3691c24b81c62e064550b52d23417568690cda457051cb1ea00f0b8fb76d7ff730a611a2acb23e472f7914c2212dd875dc70ab173ca7cd9dc665d1b3a8c168d0263505fa650847b82594cdb0faa6d61ffd9c60428b2500dee37f38fb9ce14273972a3c1caeb20f3f774e6a3b209330df993d35552e94609916134e9bad54f093dc3d215db4b7e4da46b9319c596279af7b3d27bb3e0e9bb2fe2c8739eb28ed6d14e87707a4d16b04822fd03ec884fd279a925d00ea016b9be03ae83960c49e47a5b36038e15bd83c3ceb48b1172dabec5dbbde724b31719ec83c1c4db30116df0c740e7dfe735bea33bf9a32c24a5f4743d090a4ecad6f3a330c17ccb87d0f40fdd8ba3bbef5247b1f1f067eba56d84256b5cc283568be189f1ff828fb5b0bcf6c9e73189b92b01ca2414fd3137f8d9f598b79da155459028609c1604147433f3a863655f0405e304e1a6d817568ef2bf6f7abc26ab49db502b0b5407d67de223859d860136bed9c4f299eee2cbefc47329b527d360af6734da79a9cba7596cb045f41372e98b1a345d851876b62305103c6d5e95348394e911525a75dbc2acc40064e2a51fab58d507a42e14f4b110a79de5cde89d1cd2876537a04ccb688ec39c3c1ca21d85f12c48c96fa22b10a067b151a0764ff5b4636e4a3e3f6a4ef0affc640d1258530ed06c657f6a2feb7b64bc66503ab873a00ed05950a9ba66e1986d8d54033b4de973a67ec0d21710b92dc587490e67526871409e8b796e0265b67493e27ef6ae04de553fac085bc4d377a6e3e9413bbee160ec21870572f55ea5810ada658a7ce56edac5c07a60dbad16c6783f71c6a0fde41f28f5460214826bcb9432d8898bbe305b7ded982f3d0482e139e48b2de898dac5ab8555babb52cee433dff2f755126ed6269bbc992ea733baf777ddffc367809168bfa48d333568708c03af19a005fe25fc61f4d33db2769a048d94f52d9980c8876dfc292bea934b6fb0b9098114577e18f9b97fc96222a6f18ef5f817175261227434f1344e6439d73cfbf49d9a2ff6781fd466f546a4826817edfc1372e1a8dff431e906ccc9fc3ce0ad4178bbd2fbd445e8f98cd08abe3d9c0419e4fbfd222a14cd1bfb8b0463d9056ecbfb163725cbaffe542cc841646bb8a596108a88901a1adc19c9c5aab88eb3d086ea621d6a9f5dbbbb77699bbe8b59953c7e1016204791585b64db7aa27a341ec41e62ffd487149ab38649edb88e2799547b15b02fee0da348dc33ce7a12b39db63fa2ccffc2eccd5e84b0eb8671d53548878d82faec3aa030dd124f9710568be3d2c84927798006338ff2a4e33cb2aef8f4f020f979f43872c55148141015b453def28c1aa76a39dbedaf14487333116870c5fec127e49102dc89a826ba747881025b64d779a93a67f6547ad1986c617f8976bb7240edeb9703c94719651d379944e88a95c6e4f8f309ae5aafca157dca23f0210a9c11015188507cc6daefb98a1b1144b691dc3fddcc633c66045f5554705e7481640b1a4d54dcb4a5717e10f8a4e0e6fe0f743ab7952e720118c97c4436e93276cb3908129d0fd729029e84e325f1c694f119a86904829101eb88ab613c9fa39e5ff082ad293cbe71ab0d1e3759496aefdbf659681c53dab25363ff5ca7a09eee86c85fb2bd3a41f650e75fa22df65858bb669b7bddf3e8b7c6922d2ce1c6d7721cbf922ac5ebbe4926054c3aa7255b9ee702237577484271f89b33acfcb9b837a00d24e52eac834828763a768adf9c156cd47dbfaa1034af9e98644be882ecdd972e267d9d6ec506e53786117577aca7d435c129598a534ba70a025532d5a11203b31e24ed9cf9ca50832efede8b7e39f45580dab3aaf76e55d0d7c0917d72773ac6cd642c309d03930043e2fea044fc9138620f83f95f2ccd6f6a247b8689c6f2416d41745f2aaee1b60ae4f009e506bca43294f317ce14c516b879ef2313e0b9be35a3f418f67a075a44967763b56f4e5e54af656aa12a3a40a33ec1e1d984faa800132db71c597633fad9beb50b2e4c4273c72c48e8dd4ff613ddc244269fea03b1f057589662ebe5563b8fe19b5e96b7631864a3a43c60bf69b750575549ac8a4b0fb945b265259651734fb9a97b246d5bb9a61a23051d5dbec1f40dda88400d155ad1f9b754f61a8c470431aa565dad61b660424201b994207b11a67116ac1ca8868a91ae73616b5de157cee0587c3d9efbc3f1d57d0d71ebafc4cd5c961e85586d546bc1b1e2de51ea1c0644fc10652ec3b897023570047fdd69aa1285da7cdf75d8db02c439f508bf1d062c50bbeb3466efdefef4c46f703ee511048117ce05bae56fee98f47ea0c39b23d9a5cce99bf207308f0ac96caec4e4fbe5296a58aba98c2a0022984b49481fb8dfe8f9356fa541afc82512e27821c2e13bc667446500d6f371fb6bd4d949cf88e917b9927cc682f85a81eb974682cb237ffb5f19548c5523255f498ef6c300cb47213ff5f2675383f815d914e2f913eea83043842008f3e80073ec7d0fecb84c5685eedb88f34ebaa18de723376e0deba3c715efc827a21e8b7806f5cec7907d456828df922fdedd03971ea5084a9b0ff69065a122bda85739fde337f8668f50d2b96a9c45028d990b605a471a4a7d08e3ec2a46e2cc228dade76cf615f5450651f6cbaba639003c16a9de4c5a3b84ce182013ca002203e9a95f77f35e5eca535b08d6a8a8c965ecde3469dc3f42310dab147c9a4db822a444120b1d4fad7539e87661dc683fa2db56cd92027fc4dea97fc23a6676e3f47c5eb9db2dc7682bb7f7e87a99d9582895083712145eb86cd37992c5ef4660ef796261dc302dcde68092be59b3c8c9f7064d5fafecbdb8a4ea4031d94019201e6fed6e59c3fe91be2f0ce472b75b4c51dcb5507a004ac230dedc4099a0cbd04be51d9d634d6ec74fa94a3a8e89082cdb465aec2770bd2f2ef5b6e1f273df4b659142393d601857f4348b2afdb16ac8d7db5c575ba1f9ec6459d922c68ff716fc34fe017ad69e1e7c276f31898bfd430e748f578b9d7127abc62d0e13643220caaeaf88052c2da1fa7526945da2c5d423e956a6d15393231c16e9798e2f160d25279eb102cbb65b488609bb89ab5df65f34d9b4168aeab95797cfc2f33152310ab5af80c29ab19ccafb0a3bbd7ecd66c2f36123195b6cbc8930391fa68054bec8172e0ca5b2e7e9ec4689368c61e15d916e843bce7b0512c9dbb9fd17056d44f3f728d5aae924dd7184c3497748f56acfe694f050c1f5c182e9f56428d7c8224fc3d82135435a0a5b29e685d306775ec8a6670934a9c039eacf94a953e3156d4ff0a5a47b2e33bdea6616f6e7e4db32df6db71b5e10592c369c64ceaf1dca5eb0d85f48d46b9eb238caefc7fe5f7345d1adb2d524b234ac0a2fee752141a39f6199ec965d4a551194e13e55dda584010dde45be2d1d76c8b1f1058c3570607e2b6dd749eec9ca1283fed05405c32193963087e9081d0633543c7223f26c777083fd2c46ba3c803fbfa98e8b6e997a627d215f7ddd1cd6465ad32b1e05cd90d1507c52e91677aa270fd4391fc85f49ba9ba64b97d8e4f528f7876b05d0ca1a13f1d5709f491e287a4ca2421bd97f3500204ac4bad82abdf386f1470daffe2ce9d72e90702e282a11797ac2600df23ff0b7580aea45840bb6edc4ccbc75297756d83b0833495277b6ca7d8dfe5d1cbd0c638d50458138e6d8a82aa7e0470104e992bccc00ef5cb2075b3370e785fa6a2c3b6638c9591f2dcf81150b8978ca2fbf2aff3b161293798445446a7d0e396e7ee5cc8614071a7984075bc320c9bcf0f9924017832e35657afd3d2c033d9049384977b532fbd8b63e7c6d11a6d40cea2dd8843202cf963b825ac36dfbbfffbf75f50354a7d43b642bf5ecb791ff90ca35112ca964aa0abed0bb716778c0cb91b4baa713344cb99ac64de94dc74ede5c7ee23a574e539f404dbef142e4a12ec06948db99972a23c770021c75355d3bb04fb5cfdb875599b778fe812d047c7d54ffed4841a9cb8ad4b351b28a78f062b0f807e554b0ad2d7df80d770b491e567718b55c66d6be4e653182747a94f3ba61a0f38c62fb3eb606586d7b741f393c6bd4c027bd2cc2d51e34f140a7a9bf5e2cb9e003876e0ca31978f9679aee8fe018f86591f87fcfe2cd6443e9edbe501396be7f9b60f1323ad853ea1e52bb0594efc057495b659377619c17620bcb2107fefa1098c0899e8a9aeef95c250ff64742bbcb8b6966c5043235a249389f4d539f211fd199b1f2394d090d3432953783a1c81366dad68220c360c1c0fdacf93139bd1291f0f1fe06dc1eb51e3d539a7071e2af7a236f5b69c2a47a2125355128af4466751253d3aa5387299097e3dec79e2d71153db8942bd0125c19af22c20d4ea56c4021681175b1d4878ad242d83a1d4c9e438d3da59256657f687cdc03386a78ee35fbafe4d6c8b1e3d480541438ba81fbc8474b25ecb99d49a479140d6626430360a7db44fcf697bfc3a0a59bef4ed401fafddce2186a074db62410080100093002f6465762f7367230000000014001a00fe8000000000000000000000000000aae99bc1a8e827d235a4ab2558ebccf984981c58b242a60595219a8cc5a1bf404d6067dab06a18bfa3e88878a1cb636c8abd284ed95f590cc6bbd4454d0550c42387d44082ae9f90be79bc0adedc43b4d42797334d7c4ecdab435487bc6c51150749e4a76e17ce2f596ec1d67e82cd535009e9447bb1ce68f37d65973d1228784a90caf5a2a89e7b342fc9b83b3927ffe53c2095c8f746e11bc3bffcdd552112124b90f86f591d0cce5e01566b25d2e0ad3a1b34487cd15c3bc56cace5919ed8fc4787041d74f9ce4ed55a81e66a8e5916256038b450a635629a0485a4a4ca1184ce756c956ab9afa5000677e48ff42668f1ffc4d8a44838037793bfc5c66cc053cae1386aecb0fa8307170ebf2a147c627ff5eba2a401d1fd09a8ffd773208efe245142df7b76ebcc24543839ee3658df30e6c0f9376717ec7a2dc6167db065a5f6a52105e8737db94cfa762b79b5a9131f8c49d63908d707d73b332a9b8f5333c4c9a1c0561636765933ea4a0c6bb68933059d5e05831e737cc9e56a0876a38c421be75e17d1f1fcc30e38db6666a1b2661100624f10c0886b3ce6c81609bb12810e49b5d717264edcae11dfb28fc9193176879ba54fd4a8f8a6a469bf7ae46aa28082866eba0c02733705b664cf8a51df1f9858f9fe3c8b4ffa1b1cd997af2e017c243bcad2be907fe37d32c9d14db359975aa4694413d50c58fdffb15027ad0f80e22492a296a48f96d108ca07b04bfbea9dbcdf9e0fc61cdcb255516beadec6af2bf51f5951a06684a43ae2cddf82eb6470f2bc4a98726c982f9a7aefb6cc4e431d9c4d538b9284f84ae49b2a6036a49a611f140b150ef154e39714147752fb475e7e7ae52d30f2a435b8c3b7e805756bce36e1f0a2fb18187338a4ea0c16f00db50777c52707fcf46bb0ce740161b591f446b72397add1095c3d2b2b892886a794af02e0ce3a44751bc20bcadde2aab55bc603a5c26aa3646a7d30c89712fed9e49f6ad5a8426acf25263613cbee54e7fc3454d6ad8a670b7418dfdc191a1cd4c140f674336b5507365544d87deb4e97441c81acee81507bc0d254dbe399435207b3c2751372d763c422d291fd62c843c85ff5efde5b103c7c62a6a304f8d3000812b6adece4209ec31de4ab82103fff647c9b55bbeba4ec294804f352adf858fadbab6cf09879e47cbe8ea157a8cb131bc1e58557032544be11515b7e2b17dd044dd00f8e1c25ff140eab9076f647e6ea03804be236d8f27ba8d851b50c56b84a4aadcdbcc6505052626efdc93dfdb007ed6f8eb1a135c20be860331af706d696dcba34dce4a74834d5f3d43fa9b5cf7dcdb7dae7a575779fb6525ffda2ab4c75b1dc3a1c1b9d8dae77e8e651ca189c37e9238949240c50392d9dd9a00d093c45130546d370999fe6db7e808e802c1c371050b7fd9ea83bd04c5effebfef9984c1c33a8facb30615b73611df5140fcbedac02961e0c187bcc849db6fc9fe34bc9371902f1529216f2e03231f4e3176b580110f2383bdf3cbb9cb493d9838c643a2e4f5ae63bce211ef21a52a6ab4552fd6320bf42fdf176e32e0eb64f6728ae37ae647b29e699f74d891901a77a15b599e3ecdfd5abf9d755667a956f3da673db0a5cd1ec49bb7d2d5d76b8d4a170c7aa0794453f285e7febcd5225c918811b4d5440fa20369a7fa6a713c16abf9267f6abe8cf43ce388bdf48ea6a273af0144ef8b2e40bda4aaa30636e3a65730d7a8356a17f36343411c65361f5fd42d7cea4aeaf4a904519770108a29e3b559ffd83fd379df4a57af5dd110708a91527c0cc3af01ef14114c3fedc173ce196b3555e4fc1f5139e2f9ade8c3bf930f4eef36a5782aad989db3ea2029768a55087df801e0dc78c595d062ed1bc4b4c10b8d8ab4f76435e8e431691ff75317e281ad180bcdb3ddb36b68ff473cefdebe9fd4c05bfd933311960b599b6bf0c1817aaf10d2d9e43d63a221659f32c1df97a7b1ec75090d8c4f549bcf53911fda5ae3c0aef775f17bd9135e4c53151c865ccf96ba2567484deb80ddb3d7a6eaace952b9cdd32da98fd467b5991f70292ec819c96b5c6ba77ec69cd4d9a8bd961616e21da17ce43951ae3ccc55308b52346bc2b58c430245e458685877435502b33fbf3dfbb133d61ecc5082560623bbc96412c35da3d3214819cedaecbd0e646b15ee5a58e8314d8c466b9b37a503b15de8de228063b8ade11b12cde12c7738cc3499025dd8de0cbcfe5d9156b3fdc3776ae8dccf38565e13725f943e2ad524bcb782defe9fc0673e206c91463f0fe603078c067edb365d6080b9712025690c412fab5ebf90755f73f4a942c39366cbcabfb637428262f9095685015f68b25210110e5d41fd742c914a3320559a9cdeb80321276393fd245538cb254d7df84f773aa1ef6cec216b681cf2ff1094c30bd11f643624b42ad037f973dc8e3aaf9a90c0237357aa1a68f22e54123b31421499e07e2fde4749f30ded660f923c9c189c4b783d66058756386a4067054c65a1a43b4164134fc0d5e978745aecc7323a57b28a922e1c30c75e2ba27cdf6b53b0d81a172339d40671fb20e11e917e88aa188ec08657fa8bac01246c3f23274bc71cf9b1734d48dd87110e95dda1d0ede178c15ac10c92b235a86b21bd654eab5fb61f239f92ada1bf7b5f6cac8f07a2ce0f7e3cd1fb7afa9787437a6769f3d4fc1b900ee1f437bb22f801a88372fd19f120c33dbe39336edbce9f26f7fe7b3d77132bae99123951ba05758bac304cedb4b139b039333147cad7c0a1ba7c7a6dd6fe171f724b6a7f647d0e285c8a7c85849d5bce85090e985843ea1ad97bc10c8f2248820fe860b7a6a856ca2365dc511c7f7da12d275448b5cc114bb262b74912656be22262dd4dd541c947f43ebc27028af6f51f3730e940ba512e1d6a6ce06102717bf5ee99b3af9deb008c159d0169d7ca27c8a02e1d682037fd464f2cc0bd15db444cc96a406ff4797cd3727829ff06cc37ad34811eec537180ebe3c59ca7559b94b874dfc3fa5f67460e6a73a30665a4697c87c3eb2e05e6faa44182c8f0b6ed90cd45a418dba2aa016b83d12ca120a4a26ccad244682155a30f4760b0915c199ffcf69f91725e2e235512d39ffa2ea5fa9d38e2a09fda7216c1db4022e0bc4d403f14698ea84b9131c1dfd586bf06a965df02c0c9f3592650ebfff1485044539301077bf791aec8fb7a423e131c903095c40d6c8d58f0eb871fbdf2ab192fa0a514b11478adee874689206af6c05d174b5f1e9438b5f234b8588901c80821ff3d19c36211213a3e3dbc4819f7812135f4d3a00902b5cde1fd3bcd67a19b5a55e9f60fea111b4586479f82eb356d088e18ba5250c088da44d0721fe829de3a48304aed05670854d7cc7db3160ff469d02dc2c4a5a7122601d41579ce348b108cd7a3508e45e64ef7059c12da3cd18f7763f8c7c1402a001ed92482dfa839aae227efa598695576b72354d025523952b6daac9fa8c539dd7fdb98a3ce23560952359d4ada922bff371e95d97e0e326ef91f3baa1f0115fbc6089bb5b4d1924f159b6a06bde3b20501b9c3d909f269137201cc446657c630d5b0e9e58fb526383ed9b80d6f1692ce7c87b75c9ba76c52efe9e85608df406e8041b3039e41f4d77c9996b99df8b5b41a9142c51e965553e07446286bba550b5517b97d549929c9a345dd3457afab1c980553182e7421190b73014a58afed2c9138ba56cbfdaac8faa08b879036024222391f2e46fab4d52f57778bd646115982e536ea93770265e5d61c5c8845350d268df9b27b380c45484577c16de6662e3c3d54c8e38742bcc3c42d53083144a37ce25bacbcceaf05d28f6c70c474bcc70793072a6cdca7c4f77f5f7c53a32491138e460c56c498fa72decd6125f89812e9eb6028927ec51fffb654efc2fab3bffd319c7ce2560246e172564c4b260507a800f134999b5e72b37f085bd5e8b5e4642ad3cd8579d3cc32dc029aadfef114e54e63078f8c53a9931efe41d4b12ae1905221988a4d58ae4d4b9c57738151dc150681440d6edaa8e6e18bb2200d692e06df69e78071295a6f774349c1a0a09693a7b355b337a3c1ce203415b2f69e74732a69254d9c5ac21449bf1fb05628470a7ac220f64f1ca402492ad9acf7805f973f3d40e224a8486ab976155f4e13170a624b51541682522f4e5551e2793bfc75dbb03ffe409fc0c57e168e13811b9973ff0233c68b08e7361d7c61d7dcd9949375462d2a513677f2ba43f52375c9267538f80430d1e515c2262f4ba71c379f1875fe3a5563fe3c73f88e263fecfac29921b46c152bf0e47ed127fea5a09cbc2b0ce12686c2fe155d600eb1211fb635cffcce91e0db833601d016dd3cc9ee38338b17e105c1eb5cc8deb91d52faacf0ea3c17d67a2c9c6e49b7425a3b25966385d8df9b3676825cbab335f219e63e3eeef0b4e9aca6b968342774b260647f2d2e5b045f0d2f8a83aba6764cf503552eb6262e07674273c75bab035d18660a42d85d4fe0b74ba2fd28486186840202e57740ac81da0bfe5b8e37fdcdc50a5aab2c6d7a69d5852f9dd53088adf1cfa5dd3520228c3da9098a714105b6b415d33dc2932d492e7b60284eada942b7f9366c79ca5fe9a43cc71c5e0f06dc4a5882efa46eeb734c4d173d6b39e79d321d4a73cc6d3ee1c1a810c200a14b9657748067a4e4ce713ab421d363eb41fc736267945f32274df32e97f584acec625445a0d9b415f9256689d60604cf314cc5d4dcd81393a3ba5fcad1eb031dbe7c0806aa9a2286a8fa3c7c637de0aff39d80402d4e64870d693694e945cbb31f1bdacfdaa259c2be4a638072ec3436c212a15179647b815293db60d92d92a9f85afe1ff4f570d7cea844bff0b102e7f276ee7a421f4969a15d5f81f489eea40a8193ed2019b4d1382cf303665dc2d181cf7e6590fe52efb33da17946fdbe19564b94804418f7ae457018886b1dc43060b60cec6cedb894b413884b2f62616977464a4848cd9ba71b421e5c7521d5c414661a5d7f8d41ffc04f99ceaf467bb09bca167e09b04f8cad3d225168e630273f6f17730e0466a728950c339b67f0e04d19c94cf6fb19a56f419f39a69aafd8920fe82d7c2612bc2a39f75baf982c341ae8690d63f55e11de092e5e0755d39143fe6902c943cbe6e2be263d50e25f089ea93e1d0c584b55bd843c34aa36a5da64402b9105aa9f2864af15e6b684cc5b040eec9f99bcef93626855b6bd920c5bb74b459b10ef2188be48d4e12e3a7855423dac74ddd7f81904e7c3d1eebf4d24962477c21c0f0a79cad4d3ac7b9a754783e223fd92bf49673eb05d2bfcf29424564b5ef9aefa4f15a5bcb28c5fb6c8d78d892c172f353af8756b6f2b3847bad2f00b485d3dc00e4838f54e0ca80369d391e96065089bfacc6995c4c95c7476f46e9d99bc4b4ee07208dae63bebea3735dde384fab0d09783f047006c5bea159a230502ffa970c5799f038e6645f499b6a4ec586b0d10850e3f66770e890ad203d15d05a38130528cf3afa14f1018072f279b62e96a7e288a581d625800c4cda105021ba5b16b9a6293b0a2d42a3ed3924cc895dc7ab9b0984dcb28fbfccb53fd97d9d3c977ad40934dc23327a1c0bfcad7cf41f0253365da82eab5485f0eda6be2c28dd9b3426ef5823b7cad27aa725c3070f4527475d1b8b42e555698afc1475a3543ad520e409bfb1a2136599f9c9c8f446b43ef2fd21dcdfa7cb34d52aecb4e6bf37e3668aeec45c4fd53b526ebc56483e87866e29136753bf8a46a7ad4eb93104f01635b8badfa0b0f1bb71a9dc0014001f00ff010000000000000000000000000001040030008922fdecd538ce07d4d5bcd4527d0bbbd5003882bb8be1cbf49c7f85f10554dc9351654f4cb7ddde7db1f53d0bd0fca15f11a25403f368e4f1e70fdd115412f64510dbff1b51abace5f12a0db10f9b432ea596eca07759224e601f28d75dac24516c894190f7ee600e747bec5cf2e9c6c203a8d7551f3b"], 0x2380}, 0x1, 0x0, 0x0, 0x24048080}, 0x8000) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r2, 0x2284, &(0x7f0000000080)) 00:55:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x960e10) 00:55:06 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000100)="4a5adf90228c0c6c559fd099937a600c9269db42643b434f396876a02a1465b0f1baa7b026fe387ae67def858bc1bae6") pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000080)={0xfffffffffffffff7, 0x18, [0x800, 0xec0, 0x9, 0xb0ed, 0xfffffffffffffffb, 0x8]}) [ 190.436300] sd 0:0:1:0: device reset [ 190.501387] sd 0:0:1:0: device reset 00:55:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x0) dup3(r0, r1, 0x0) 00:55:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="62747266737f", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') bind(r1, &(0x7f0000000100)=@in6={0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000940)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}, 0x24, r2}) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x2) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x40, 0x80) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:06 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a3", 0x10) dup3(r0, r1, 0x0) [ 190.794517] sd 0:0:1:0: device reset 00:55:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="62747266730f", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 6: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='\x00'}, 0x10) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000001c0)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) rt_sigaction(0x31, &(0x7f0000000040)={0x3c, {0x1}, 0x90000000, 0x7}, &(0x7f0000000080), 0x8, &(0x7f0000000100)) [ 190.845188] sd 0:0:1:0: device reset 00:55:06 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:06 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xd37ca0) [ 190.913342] IPVS: ftp: loaded support on port[0] = 21 00:55:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a3", 0x10) dup3(r0, r1, 0x0) 00:55:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000100)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:06 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000080)=0x7f) 00:55:06 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a3", 0x10) dup3(r0, r1, 0x0) 00:55:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x7, 0xfffffffffffffffe) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80200, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x7, 0x9}, 0x8}, 0x10) 00:55:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x8, &(0x7f0000000040)="d41b71ae17f63a3eb406d46b4fd271720a1b52ea77e6063199c77585a8ab56378f9a45861ec2df1827fc49db0bb18e84e081f596129fc15acda0af2ff0e40636d44c77c3ce0d9e6852d10f7ca91a700e404b579a7618") 00:55:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa069", 0x18) dup3(r0, r1, 0x0) 00:55:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000180)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:07 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xbe5690) 00:55:07 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000240)) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x30) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) r3 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x4, 0x800) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000200)=0x14) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x5, 0x9, 0x1, 0x5, 0x0, 0x5, 0x80040, 0x3, 0x1, 0x1ff, 0x80000000, 0x2, 0x3, 0x9, 0x9, 0xb9, 0x5, 0xffffffffffffffff, 0xab8da71, 0x5, 0x11, 0x7, 0x8cb, 0x3, 0x1, 0x401, 0x3, 0x0, 0x5, 0x5, 0x200, 0x9, 0x100000001, 0x6, 0x6, 0x3ff, 0x0, 0x9, 0x5, @perf_bp={&(0x7f00000000c0)}, 0x4000, 0x400, 0x401, 0x7, 0xffffffff00000001, 0x800, 0xfffffffffffffff7}, r2, 0xd, r3, 0x2) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa069", 0x18) dup3(r0, r1, 0x0) 00:55:07 executing program 6: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcs\x00', 0x422880, 0x0) recvmsg$kcm(r1, &(0x7f00000027c0)={&(0x7f0000000040)=@pptp={0x0, 0x0, {0x0, @rand_addr}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000100)}, {&(0x7f0000000140)=""/115, 0x73}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/220, 0xdc}, {&(0x7f0000000400)=""/194, 0xc2}, {&(0x7f0000000500)=""/112, 0x70}], 0x7, &(0x7f00000001c0)=""/26, 0x1a, 0x72}, 0x40) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000640)={0x0, 0xea, "1cb8926fdc368333ed845cf0d65839ce9e6844de204af1da0c29a7f78145cf95722bca7d0997f93ac54c0b289e39607fc4ea955ed0cc4bb0cc4449f2b13cfa43d606198e3acf020f10aa100b7759de0b9dacd929ba4147aa709b4b466fafadb30eb4c24484c88aa2fb6ce18a811d35cfa98eb17517340ba98499fe57a76cbae96d54892e186193e163098d389eabc9f673cb5902682cf52c460524444f39f67080bd1622d51b45c2102630e05c1e843b846539ed308b6ac42ec51495a34c8b59ca40b92f45edafc9f1828948bef689880944770c25b956ccfbb7a4cd190414b6b5f00bd10712f868abd0"}, &(0x7f0000000740)=0xf2) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={r2, 0x4}, 0x8) ioctl(r0, 0x2285, &(0x7f0000000200)="17f878920800d0a2c7a6c596ab1d90ad17b7997a240336f0bf1bb5866e89f924271307bb0a7ef36837d621d4893719e26acbcfcfa88a148ca7f2abb2c238c58269b30000000000000000001000000000") 00:55:07 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa069", 0x18) dup3(r0, r1, 0x0) 00:55:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 191.851887] IPVS: ftp: loaded support on port[0] = 21 00:55:07 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400400, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000080)) 00:55:07 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x9e1c90) 00:55:07 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f00000001c0)="8cf67d08091bb22c8ad9d180daebdaae6c6f8b11a900319daca43677c06c6156ec78601645d3cf1e685343b0a19887e3118595a2ad69e48a3a661bf0249d9614ba571f5e7e18bc9f3d534f905d9e173f4a32205e8913136cb93010682bbc1bdd25f579aabfb6c0ad804c82bde288f71eaaf6c7ae61ef56d5362eece8171c44cfe956e55c676eebf93180005fcb55a98b958ea45a0cda7d6c0d4f5ec46e969c3a166706d7b3ce548d13d8528a2ca190d5b7532fcf43534ab5968c85f3460aa0f6c9be63c84eb1cb1d82a062dadb") r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4000, 0x0) syz_mount_image$nfs(&(0x7f0000000300)='nfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000400)="dacc7ebe0f7fa848dd8ff625ccd494c8c0afbdd2aac6c3d16aed525f27cfead62b445caa773e086b68822e7a8c2d6ddd0a6c357f7f7c409d4f99eec768856c285bec9b784b82cc037a76a24481ee9d054fc97bef6d5c48a7c6b1ae62e01be65815c577ef5cc1cfe47adac678233f6c2e3e79eea74e9ad421bbd0b3d10717bd97a1480f2b0b133aa38c1b48753af6979564149847707fdede749f1e9582cbf9ee7f0d5a49493740dc2685b5d956919817afd49046834f6e", 0xb7, 0x2}, {&(0x7f00000004c0), 0x0, 0x7387}], 0x2000000, &(0x7f0000000540)='/dev/sg#\x00') ioctl$KDSETMODE(r0, 0x4b3a, 0x4d20) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="a5f9f7a3b527c556d2bb1d8b3d71cb14d2dde787dd070000002885232d66b4661560258ddb8ebc83be828e0ed2c34a9279c161"], &(0x7f0000000140)=0x2a) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1}, 0x8) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000002c0)) 00:55:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0", 0x1c) dup3(r0, r1, 0x0) 00:55:07 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:08 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:08 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x105, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) 00:55:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0", 0x1c) dup3(r0, r1, 0x0) 00:55:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) fcntl$setlease(r0, 0x400, 0x0) 00:55:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 192.487153] sd 0:0:1:0: device reset [ 192.536473] sd 0:0:1:0: device reset 00:55:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0", 0x1c) dup3(r0, r1, 0x0) 00:55:08 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xa2e7, 0x40080) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x4, 0x40, 0x2b, &(0x7f0000000080)="996b6e67d9db105839ef7bb1f7c1e442a64d5c18e0f91cc5200dfa5992d8ed3f329f42da17127eb03f3bc7"}) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000100)="8f9e1e5ef4b854fd87b0aceba9a4db6f00c8fd0bf4cbf0a7f39caa23cf511c7ab9bf17623a385450bb63b0c0182c3060a700ea8907b1ddfd230f3bd8fcb9fd62ebb8b575264b6f720d29c22121ced444d8f9769f0c595c3c64f67d3f415d7ca479128d4377fe3fa5418776f3a3035c614079f5a26cd8065cc5a753a026e58dcbbd0b66309e61649258163c") 00:55:08 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x9811b0) 00:55:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f6", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 192.634142] IPVS: ftp: loaded support on port[0] = 21 00:55:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x5, 0x505000) timerfd_gettime(r1, &(0x7f0000000140)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x84) 00:55:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 192.772378] sd 0:0:1:0: device reset 00:55:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a551", 0x1e) dup3(r0, r1, 0x0) 00:55:08 executing program 6: listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=""/4096, 0x1000) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000100)) [ 192.850455] sd 0:0:1:0: device reset 00:55:08 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:08 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000080)) 00:55:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a551", 0x1e) dup3(r0, r1, 0x0) 00:55:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:08 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)="52bfb09acdd1f08e77d2be3080031fe635c77cfb5629533115066189b5905b78f1e807c32bb675f4899f2a927d4c2143db1d89c4") r1 = dup(r0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000002c0)=0x1f, 0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x20000, 0x0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000280)) sched_setparam(r3, &(0x7f0000000140)) 00:55:08 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xbb5120) 00:55:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) creat(&(0x7f0000000040)='./file0\x00', 0x2) 00:55:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a551", 0x1e) dup3(r0, r1, 0x0) 00:55:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:09 executing program 6: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="0d6a207893e6ce656544219e3cf878cff6353a1851cea7b41ee870e73db94bedf45ff075976b48c5662c05b84a991bd9aaa3756ca71cac7cd74378bafd510a3b5d09fa5f81e76ecc49a76b23193e48f17204754162cd35b06c3c0443ad8d02ffa3c5ff0d4038e39244c2c4f3ed5c916584e28f8729c460012c43e805967d9383a630797d036d4108c38e16b8ce78", 0x8e, 0xfffffffffffffff8) r2 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)="da485e7d4f896d6417bfbeda05b482d23a96b11edd94846b185704251b89545e59ef66203224de1e226285c799f87db818b6e261f625dac57ff33da2126ae60c3bee55a3716aeac872c5976e94f4c310fc6be561b7a9983f06b5eac3d544b5844c73d262cc17c18b2e1de5ae3cfb37d846b386bf214eab83eb07ea95da065befc7539d0e160d14a496c8cfef1a234b405916bf9847a330b8504c0b97dfae70883e2c44c891071647bd5c675e0f733ae68b38e6ff597dad979359d05b32e140d7c100cdb33da44d1edd1d82e2afede3251d96e309b9abd3e75ff4dffaeab4c6cafc0293c03caf71219614b5b7cee631604049796df73367cd749f091ebac2271cbe2a26c62f776aa384224f9b8ea79b12101702a96b44e95ddaae2a07a06be1888b8430cdf78838fad7bf73b0a1f3cdcd185640705c902ed97ea349f494e29fe9db31f42b52682a4f06e2c173527fa7eb4fe97b57a3142fe9d5b2fd7a00d8b68703e9c877c63c8b28c62f7a4ac401889d89e3f065e572473b09328a26b6008a4e90152c5f77a3f28138ca56bc521295843f78150eea78323d0396e7520bb1ec1aadb784bdf54f3d85f3d20d3794bf0c67b1a75bdded9d56d6273dd18e7c91d62d4806ffdb439a988f728d1c166216d0ca7b93c00ffbbe9fede8f1e23cdb28629e749d4cec24ddbbe63ced9733d0abcc3e6c42f5241d00b301b677c8aa8c1eb3b0b72b003e9e462614933b8f08cd1944325e6a6078d2d65cdf113cb6f95a554335c2331c6205d28aa50c88f07bd4c1f6d4669d66a6db1caa072093199dbde338db344cbf666d088c3afccef8a6d78e028d1729917560bbd4fbd0fabc4a26f5a88134ad67cbe0107947a9938d032f83aaf11db507a60c4ba8a480cb5495d3195fe18cf003238ac391699e8efa231e34b8a2047276238552687275766c6927391ed172941c8678d440a4029b057c47cec1e88593193c668e8e443bdd95e27c494459db830927f4af2985f30deb0d89b3691ce0cec52129ef1d84965c22f61dbd06981d19a2d71c106236b5b8e1fc602769bbb53336939054950b33488476e240340b6bb00a872b3348715d1ed6d81ec6043ee89e2a59bb4cdeb96e6496c1e90df106322c1e9d1c1ff53afc931e66e63d7b61cba63cd50ed9b9ea9aec83db309b8bf2d7fa5da2564d3e411cd64be783ef447925aebab699d4d501da06edb369feabc0b73df0c0edca5e591e1f954bf1c208b9993656d210ca6e53f6d49a2d6e100b36754e83fe2f44457f64f37cf689a0e77837cd605fb3b89d100de7828e06be1d94d4f99ec88cafa16f5437e9bfe9ce256ebaeeecbf9aa8be1657ff160554fe56c5d14e0adf79f2b75573b5285ae404e7ce3dcce9ef9a3ceb32b87e34a20d1401fa310d2d3dc41b71564eed197509b242461032288c504f4d66cc9d0becad4c41167339f12ce2ceda89dd40801936efa8e5b2c68df724820a70ae2eac5269f4f34c45e8796ef354db50468a7af9d8bad76c9af33c1a5cbb0cde2bdecffa8e48dceffe179361b2c9bff6d7311f5386fcdaf735cc1e7ba3094ef4b9e480d805379ffca425ec58fdc0e9693c690ebaccae310a2b18b5c29749a96f95d518f0a035f7caedb5995ca59a6f7bdce64f6fef65e472d3dbf45f1bda4b66137d9139dac27c1bc5f733ce683ff399de058e591d084b35bd656efe8360aa726a108110b4924f591c21b9cdcf14ef68aae4034589ffef747bd9f5162b21973720c84bfb7444e574be40ef73b32ca689c1b2a253d7c6b6066ca731b38f2d8ee6ccbb5640ae2884b5da2cb9a16190f35001d11952bb6e34c7a98c7658ba711215677322fc627b488369bcee82a74d07fd7d9a3b3605d310d41a0b09a25d11d971ad698197b7de52f4863cca592abff1c2970ddb2f21f704912335aa24b548d5f33e5ca80193bb0745a83f544aafec7bab138fbc9e9f0975889acf7fa8a5db7957cdd32bf7c7bdb4633649b5d2e28d84a603b43bfe2e1c96c371298ba7355f840a675fc17f0b7b57bb6d317e4aac5a1b683c5e6515281e3ba1ca7faecda33e40cda0ccb9f758c8c90272ad265cc9e2bac991ff5b72d3bd4be89073f4c9973e67e53c44127255953564c2fed8245a71a1fb2b9cbfd49c5bbc1d411fa0a32c503cb3704341a811f45a8bff0b70bd62319de21eb67a400fd3963ea3c7ec544920a74a5017d76d5111340516b46cf04b72c786cb8fcd07004949855052ab88be9280c07bb23d494a07cd42e24848cebece67275ec6de8a4af9246227aec91aa87825be5fa3fa887b630e78cb15618df28fd2b333be75dff03ba1b90c363678ccb95c2adabfe126939356ba70133e73fd802cc0e248cc04b29f2a4f577363128def6bb085d3aeca470a0c95da048b3e71f5565c3c86b2487be5728d888cac2254fb4fd44cbd376a4cc81be0c6b7d8ab8d8ca77d37ae8685a68ad3f41a2870bda67252509eaaf0fca8ca87389e29cf9a6306b944cb8bb401d73a08083fb65ef4fea6d8b479bcd699971877811575ed09e21fea1bb9fe9d5eb05c2a18f16d09f31e0da307f29fc62fd25e2db3605d94bb683888512f535c606d4085afdf0bca9712e2a9e84f168b424be5be07c640c65eb5641b41721e051410010d3ae913fcd8fb4cb534e2b5078db2ceaeff8fe04f2aab9bc8268f78f5b5f7af2bb804416e1cff04a53a2656bad85a39bf0a76fab8ddc6d4b6dac416f5e6faa36771c67ab69b85d6f2d92a63e083e30493b08b22cc8ed17fb103bd6002d0c24b9b30ca8529408747e894b8e4884603822a1bccdcd65c0ecfa76263095cd674c150b5b0465f7d8707e4755062a64d425bee0a3ed0fa524a2a195504d9a81e183e8df96229d105fae81120a48d0bbf7c2ff67539be010a4e1a0e1413ded1ffb8d2ba4101c343904723ec8ae772f6f6277a5f9dc517cad2d6d8d735074e1299ec1e47bd2655262bfad01ec49641c5b2f6a3a448adb7302509b3ded4850eeb289d0703002667e3f3aef2178c85b3c617096b8c0c455ad05e0a992ed3ea5df51660490d52c67b34994b52e6183d67e647c72bb5426c7131ba8ec68b70caf45dbb22a3bf105d2183766f4694328c026040eec7e54aba0f48746aecfe50a008ed2a7d0767bb5f553d7406f73d10a6b7e97e34d0c366452b131bd059fa1b532ec47981a43c36510255a3156bfa81224530ef69cb7cc1c9eeb95cfdb3c8c6be1d6758ec6caa457da2e28841b6da9f29b3a4f02924d368feed6843fa50444da756d586a4efbc7e01e6e055069eee5bd24a491dc7d3b381f8d96fd11defa124396df79d81fa6e79c536d57045282875dff74bba647457e5e7f6ef8a32b314ea504a439cecfeabe4fe0bab2ecbe16758915ba78241148918751470c612990dd18a2212777333837d7a4f4eee6cada02173b08dc8758efd6daf5b379dd2d3a3156b9ac753874ddb954e3709439d37aeda865536a8a1e0ab8650247f38db8b87075192167041fb02cf5db6e744c01f20e006a795a0f92c07f79cae7fe810ce1dcd889c6de12e6089c8a8b4481220759320710e061eb241afb3310ae01b78cc45bf97172b2a93d13d433b7f893e33ef8df2299fa04a5d801d36674930b408f2b998ff2b84663bc4549eed272eef8ae2e4fd322f9dd909cf0a885bd842ef25ad0052652f20bedf188864c75857f7d90164f186dfbb3af86f04ad4ac088209b5f7e2d4f881663f9f26eba0fb9fbe97343d3b8775b0ac0cbe373e5a20016fa49daf57a37625a5f55fb568adbb9a4b7eaff23f543811939f1d2d04995442224c743e3a870864a7ae7bd4c24c3d686316df0983957314cbdf62b95894c7e5c12f77c0c33e8727ed3b0a4e0d1ed33172e2af3170cba17a920dbcd0747292e15f2ddeff30a3efcbef6ea067fce72d148cb3bf7e75b346fe3350ce4a3f639da6fd6d9abe55e15cfc928c271510cd4b48150610cffd1c1f8571af2791bf75283f3f42b31402dfb17c91e52c43c7c8ba5bd36ac46035f50e9aab936fe2b9aca0042ff4984fd372bf6a81f7d46065c8bb07b575a1f2f2297951f89895cd9515280b555aaa1c8230eed38a8a7a3b5824f2d49c9d775fea7e1f3783f88cd5a6ca877fcf539b7917a0f4ce2afaf876275cc83551d983736c8c480802232097c4e644b8ac2a68b235d633b1e9a34604c967f6ab4674df0b9c29fbb40aeee3ea2341bb361b9e482dae9849bcd39bca2109495f8ad28f35ed49d8f8ff5c0e83abc56e55efa29c738c4a22fcc8f1d545f4b8297771d829f7e1066bbcbc43484e7742e29aa6e1a9fdf0c52f6fcc36a82e879f12d431e0c0e88856cb44b786a086df8a13054ed5cdbe9135063d8689915f44879ad3ac7b4134c1247d591b7c34b59bcd82b0b8ece05ca138cfcbdcad81ac0c7d44f12136274dda56f4531155b602cf937676bcbf4249fdec73ac3c0b25ac6a015d0dcbfe8453894f1c2af389529c4d91dcb80e151bc900efed36559b304dd6b4893d66687d81eb4c3aaad26ec7fba0fbd4d0e727bcb998a9bf8e53f603abb6d44a7bc4263c40b7daa3c1f75160a390d9657078b4fc7cc1d094ab51e3aa15cf8b2ed169cd4fdb83b52458f5b991d2f88b295abf3f603e9d80bffe9ee4bbb3ec4980f8a16e429eb2e0723490680f025a8e0c6b99ce5c5832680ed0645abf1d10c3705b0dbdc0b3719648443baba961871c66f895615881abc6ddf321f280ee83fe5d548831850f3f5ce680df844661d3c72a8c32ca5a3075750439387a2c9ca282eaa73d6c9c5ec2548fbdff3d7bcbdb600aebee8ec0d5a3bba3f0f59d7cdb239ceece8bc2d002371a0bf92ddb32c76bef299c4d0ea1a866590098cce8a5a664065c289b78e98c0f05ee77d1e90b22f773548d6d5af0bd656dfba53cca33385179b6dc966cc9bfabb2131176ec8bd140cbfc55c11ed058c2f8c9875c81cb9bfbb5dc3a1d162c5c574fefcc2f5a707fbc9a029ea0cd68c8e334b9f283e0a217fa55436eac98c2e39b29d8c800c2154388d29e49a4dbd6f4c48914241e33ae13cbb274b7b21e9d57f45c53c2db434ea930527ea6669c05fe5219eff517c765ca6ad06bf1cb249735db74bfcd4f20862cb3e2544cf714b511495259bf72a4ca3b29fd3eac645cc23b46e121c08c80c8a3ef851d8198d75a9d23f1c45be4975bf36aee344cccbf67492c7ef06b7796245c5546a22d94597161473d578282bf3a874ef6c2c6078e4372ccd3b21c04f19e3163f6c705057bd58ab4cec1cb15638507904c7475b384a8cb1469c11cfae2dd02dbd7e0639bd8a6c7ac2f6e5f1cac98f5d2add9c844456259a7ef13cd00af1e193dc87dea5f38ef3d3c447645675f98472435c779071e4f54051ddf8c514bdc5303cf263a8669425b8d4aa82cbe146dcc27d34e526fd11c8ecf685b0b858ee74efd3132fd6cbe8b5f288907b5a685591e346f23d873b66789a37662d5beb99a6e55942b2b312b5334c68b735eb20ae4727644eb05ab49b367f1cb86ea1781a714c92668c86ab0b4f49355b1862b3b9dd9675fe01b4f599adc237c35f0079df8e30fc1d6d9ae154103000a62126e0884b84ab29b2a5f2958b0ce3dce2706d9210e4e7972f58051ceb8e7d10cea96319e30b45e9df47191da97df448cb0f8912f6067ab2862f4846a5c76c85ab6ba77bdf0afba967c266beaedd1a8288c2a4f63f4e4fc3a16c6f5edc8a2a877e0a5a655722f89e1195338b4ee332abc582e72829fca78c334d3f7dbb4b200b31c4694843dccbaabcc975028fe1d905c1f1949e5be98242", 0x1000, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000340)=[{&(0x7f0000000280)="d2bd388e2950b0c270db6224285fff1f831b97c8ce6c5e6dfe5d0899553a82c02cfde05df729682e98250b4fbfe07f74261d8262f2617bc6f544411ae1daf9c24606e4ef8aa3d2c0424881fb9fca13", 0x4f}, {&(0x7f0000000300)}, {&(0x7f0000000400)="74ba4e7fb5091b230f13558da254d5c01778a145f2905cc4048f94e0b4f5d44fcc7e57eab6c4304ff2adc6c6effeae5e820a42ab36510ba7e4756db793a9bfc69c99b023045f5c6745bcaeae4150cd208af3de11e2760e2521cf26bc59290c42450e67346825fcacfc0c2350555de3fa20ed2e4d5f8134696b", 0x79}], 0x3, r2) connect$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x2710, @reserved=0x1}, 0xfffffffffffffe8e) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000016c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x7c, r4, 0x420, 0x70bd25, 0x25dfdbfe, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xae7}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x8001}, 0x804) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r3, 0x2284, &(0x7f0000000080)) r5 = signalfd(r0, &(0x7f0000000100)={0x4000400}, 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0x40a85323, &(0x7f0000001500)={{0xffffffffc56f81ee, 0x1}, 'port1\x00', 0x40, 0x8, 0x800, 0x2, 0x200, 0xb8, 0x80000001, 0x0, 0x3, 0x495}) 00:55:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 193.331171] sd 0:0:1:0: device reset 00:55:09 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 193.413876] sd 0:0:1:0: device reset [ 193.459829] IPVS: ftp: loaded support on port[0] = 21 00:55:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a55193", 0x1f) dup3(r0, r1, 0x0) 00:55:09 executing program 5: r0 = dup(0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000100)=0x40) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) sendto$inet6(r0, &(0x7f0000000140)="12289706bf578d6aa8c153ef933ee5e9bfbc54328df986bf2e0e24ed490dcef1bd627f14ed552ca75ec660288a525ab9c4a1a24ca1d140d5fe2f8b62c4c7d45b102b8327881b4866720e46852bb90203c591a3c08d3d7acdb16230fc0e093e07f04202b56392e1ec5301d5d9c37250cf85bfcb02bffbd9856af9f3fef9f102ec573d852f38a874ae8745e3247428078175a207706727474e17008bac3c80d88569aebae41fb2b75db2cbf2c0e8d0528c57a4836674afe3801b1daa4a394bcde789ce439ed5ef00372f46d050ac5264571e3721168f6ea82584d9d253449314971d780a44c5", 0xe5, 0x80, &(0x7f0000000240)={0xa, 0x4e23, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0xd6a0}, 0x1c) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) [ 193.650135] sd 0:0:1:0: device reset [ 193.704753] sd 0:0:1:0: device reset 00:55:09 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2), 0x0) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:09 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xd17900) 00:55:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:09 executing program 6: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x100, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000180), &(0x7f0000000080)=0x60, 0x80000) write$binfmt_misc(r0, &(0x7f0000000200)={'syz0', "94b7fbff4f2f5408468ade9ca32a2b3d553e9c37930f64f9c38f6dc01988e937640a366ee60fe010de05c117524051482a41a2b4ac96257313248accf123288193d5fae8a0d1edf0b6358e9100751dbbdf7de86f4dd517a21a80b1e89cc3766ab8d85949adbf27c3c6d89f204b262e5dd61645580980737206b5bafccc509283cdda5fd2f8066b8526acf83a80f5137945c2575960a637edd913d8991cae1871ec5d26c47642e589b6fe94031746c63152c7ead42a363c3508ba94f5abe7074ac1806db10886fc092be39c5ee62eb13f1bdf491e2fb23d949b86949d825bd14471"}, 0xe5) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000040)={0x60000000}) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:55:09 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="62747266739b", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a55193", 0x1f) dup3(r0, r1, 0x0) 00:55:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000200)) r1 = memfd_create(&(0x7f0000000040)="235d21e62c00", 0x2) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000100)={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x1, @random="dca32b805a4a"}, 0x0, {0x2, 0x4e23, @rand_addr=0xffffffffffffff04}, 'veth0_to_bond\x00'}) syz_open_dev$rtc(&(0x7f00000001c0)='/dev/rtc#\x00', 0x56cabfdc, 0x105200) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000180)) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:09 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x7ffffffc, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x2) 00:55:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a55193", 0x1f) dup3(r0, r1, 0x0) 00:55:09 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 193.970888] sd 0:0:1:0: device reset 00:55:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 194.026474] sd 0:0:1:0: device reset [ 194.151591] IPVS: ftp: loaded support on port[0] = 21 00:55:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x600000, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x420080, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x42100, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"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"}) 00:55:10 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x4, &(0x7f0000000080)) 00:55:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 194.362283] sd 0:0:1:0: device reset [ 194.398275] sd 0:0:1:0: device reset 00:55:10 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:10 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x501000, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) 00:55:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(0xffffffffffffffff, r1, 0x0) 00:55:10 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:10 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) 00:55:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x20000830) [ 194.592080] sd 0:0:1:0: device reset 00:55:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) dup3(r0, 0xffffffffffffffff, 0x0) [ 194.640144] sd 0:0:1:0: device reset 00:55:10 executing program 6: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2, &(0x7f0000000040)="75830502b3454667c699d68dc3faf70c8e69f46eab64ae8ec4fc8c0fb8f2f510ab4bbc01c15761d1a6a7d325d3f2fda47d5cd0b4f8f3c8890b0880773e88946b9d75402e3fca464e853ae65dc2d4b1567b4faf01fc773db558ff69d68fedc85f") ioctl(r0, 0x2286, &(0x7f0000000100)) pipe2(&(0x7f0000000100), 0x84800) 00:55:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) 00:55:10 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 194.857572] sd 0:0:1:0: device reset 00:55:10 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) 00:55:10 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x498450) [ 194.894150] IPVS: ftp: loaded support on port[0] = 21 [ 194.903323] sd 0:0:1:0: device reset 00:55:11 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x8000}, {r0, 0x10}, {r0, 0x100}, {r0, 0x100}, {r1, 0x1a}, {r1, 0x92}], 0x6, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={0xe716}, 0x8) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x0, 0x0, 0x40000022]}) 00:55:11 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x6bc1f0) [ 195.339508] sd 0:0:1:0: device reset [ 195.418371] sd 0:0:1:0: device reset 00:55:11 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000540)) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x2030, r0, 0x0) preadv(r2, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/238, 0xee}, {&(0x7f0000000040)=""/44, 0x2c}, {&(0x7f0000000200)=""/109, 0x6d}, {&(0x7f0000000280)=""/219, 0xdb}, {&(0x7f0000000400)=""/192, 0xc0}], 0x5, 0x0) 00:55:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673c0", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f5", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = getpid() perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 195.588864] IPVS: ftp: loaded support on port[0] = 21 00:55:11 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 195.679766] sd 0:0:1:0: device reset 00:55:11 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8, 0x800) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 195.758507] sd 0:0:1:0: device reset 00:55:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:11 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x63b370) 00:55:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x80000, 0x0) getsockname$inet6(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000100)=""/128, 0x1000, 0x1000, 0x8}, 0x18) 00:55:11 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') socket$inet(0x2, 0x0, 0x0) pread64(r0, &(0x7f0000000140)=""/53, 0x35, 0x80000000000) 00:55:11 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0xfff) ioctl(r0, 0x2284, &(0x7f0000000100)="545773801abe2bb13fcabb7b7525050add7cb2df5b561dc7ef85618c2f7c2edf6dc50d4c909fa07c3d1c0cbd06b17ce2da519c929c9f6ba7f7a7bc188133be417cd965be24a7df6783e08862df54a3b1d650c323062d964afd1b40f2169d97b91812c88f1e0a971eea42a8dad4b820b71005955c7e446180463bada18f97380a1e") 00:55:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsL', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 196.078313] sd 0:0:1:0: device reset [ 196.137942] sd 0:0:1:0: device reset 00:55:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="627472667303", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:12 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfffffffffffffffb, 0x40) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) 00:55:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 196.198513] IPVS: ftp: loaded support on port[0] = 21 00:55:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r3 = getpgid(0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3, 0x40180) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000140)={r4, r1}) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:12 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 196.435113] sd 0:0:1:0: device reset 00:55:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="62747266738c", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:12 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='btrfs.cgroupeth0'], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:12 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:12 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xa82eb0) 00:55:12 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x8) ioctl(r0, 0x2287, &(0x7f0000000080)) 00:55:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) fremovexattr(r0, &(0x7f0000000140)=@random={'system.', '/dev/sg#\x00'}) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x4) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x1) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000100)) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 196.761344] sd 0:0:1:0: device reset 00:55:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:12 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x180, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x84000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0x80000001, @dev={0xfe, 0x80, [], 0x16}, 0x5}, @in={0x2, 0x4e22, @multicast2=0xe0000002}], 0x58) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x40002284, &(0x7f0000000180)="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") 00:55:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 196.984443] IPVS: ftp: loaded support on port[0] = 21 00:55:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:12 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RMKDIR(r1, &(0x7f0000000140)={0x14, 0x49, 0x1, {0x4, 0x4, 0x3}}, 0x14) ioctl(r0, 0x2284, &(0x7f0000000080)="8b86bc3ccc86d6b18450d7b24d53c1444c562815f870749a7b423c852344b8eb7546858a19330b6775402afc64ba2a095d9ddc0cf9f5a7eebee5730664177696eac0aee86b624bb5305dcde9875db027ec2df5a8fb4830288ff79c6588ff2bdc2596c9eca534d66420926c3c63469461f4bce2c0d342944a474e4016c91f853e") r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x6000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000001c0)=""/228, &(0x7f00000002c0)=0xe4) 00:55:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:12 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xaa3250) 00:55:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x400840) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000100)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000180)={0x0, 0x65}) [ 197.251900] sd 0:0:1:0: device reset [ 197.316537] sd 0:0:1:0: device reset 00:55:13 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='btrfs.cgroupeth0'], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:13 executing program 6: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x20, 0x8c0) dup(r0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:55:13 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:13 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40000, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000240)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x5, 0x9000000000000, 0x3, 0xfffffffffffffe6c, 0x1}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000400)={r2, 0xf8, "db5db9c81206597876eb2347190295d910a75bcad6c6dfe6ac387ecd963c9742eac7f141ce76912a91d779d67efe0e294294f7af7da9288673a7059bbe0b986e03b3d9ba7505b4191cf3373a653a98fac06116f049a8912b3db4ef52275550502d43b8961e45e93c960ee4c8e15f6f71ad555483f4432baa9797738bbe9d95a3fdcdd867b4dac4ad13315c5c770f2db3f967629e036bd94d850d9028dca329d1ff8d3547d33b807c69df2df219100439477ac48a166db90a2381b6cb2466f1c937d852cbf8244852f14744114b54c2139f097a0af9d5e93fc018fe8423b6e4c529349487e69508f496d481e66a046161a82dca41f4deb9f4"}, &(0x7f00000002c0)=0x100) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl(r3, 0x3284, &(0x7f0000000140)="0b1d5746c67781e7dda9a8592e1d8f62378edf6ff660f1ea385bf87878c0969c94c195940410bb8a568f507e4486deb515f8244900d6cae50f4f2a41a31bc286eee10eaab6b39a7510e02d0b4fb79280dd9ae39967c5b32013fadd383f3af9161bffde8cfb521ba35a4e00efdfaa01250ca43f05fa4dc633879a564795fdbc6efefcbb8fc32d8b22a08a5580c13d9c95cc68b9133bcaeb03a81949d0e681a2bd802d0fde765fda3c85ce134439e6343dc6e576a1889ba4b47abf8b000000000000") 00:55:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:13 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) 00:55:13 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:13 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0xc, 0x8, [0x4214, 0x0, 0x9, 0x7fff, 0x5, 0x21, 0x0, 0x80000001]}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1, 0x10000}, &(0x7f0000000140)=0x8) 00:55:13 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:13 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x90000, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000140)="29da7454b680fe1451947da5db438771589c263169ffdba80cdbfcbc639dbc22632be74095d426974d8faf2bd519") ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(r1, r1, 0x80000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_settime(0x7, &(0x7f00000001c0)={r3, r4+30000000}) [ 198.085803] IPVS: ftp: loaded support on port[0] = 21 00:55:13 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x407400) 00:55:14 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x40) r2 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000240)={{0xffffffff, r2, r3, r4, r5, 0x182, 0xffffffff}, 0x3, 0x10001, 0x200}) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000040)) 00:55:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000180)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 198.343402] IPVS: ftp: loaded support on port[0] = 21 00:55:14 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d694776"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:14 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:14 executing program 6: io_setup(0x0, &(0x7f0000000100)=0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000140)={0xffffffffffffffff}) r2 = open(&(0x7f0000000200)='./file0\x00', 0x1, 0x80) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x200001, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) r7 = accept4(0xffffffffffffff9c, &(0x7f0000000540)=@rc, &(0x7f00000005c0)=0x80, 0x800) r8 = dup(0xffffffffffffff9c) io_submit(r0, 0x4, &(0x7f0000000680)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0xf, 0x100000000, r1, &(0x7f0000000180)="15643c9e55a23c77cf54334fd1cf2221ed26346ba1868fc38c838cbbeabd357796e6468623d29b1f7447e22429dfb43c63a17331537cdfd70d7a6f17c34857db4ce530e97efc19ae23cff81d6cb81cd0e5955ad9478bed4d385516b090356aafb61f3b8fe2dd3e1095", 0x69, 0xb29e, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x53e0, r3, &(0x7f0000000280), 0x0, 0xfffffffffffffacc, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0xa42, r5, &(0x7f0000000400)="fe047c9b6c732420de98a988f76691c4189a16cc2dba8d3fc209d7f85ad6b6911d13da06f1b6525f02c12dea5f4701e88752f263098c49b86cc89d0b99d4794a70bd37cea46a89c47e9927f0f13d593b3ee1a9e0a740d59fd81e58e2881f67c59a9ff7445f49118ea127c19a68a142a6738604a7fd7aa813d6ae925f483538cd8d24bfcee8942807f93a7c74b8ae274993fe6e33f22dc2421f10addcb4fd0fa6da", 0xa1, 0x4, 0x0, 0x0, r6}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x7, r7, &(0x7f0000000600)="3a463445839e1364dbb00557b44c1c471c", 0x11, 0x7ff, 0x0, 0x1, r8}]) r9 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r10, 0x10, &(0x7f0000000040)) ioctl(r9, 0x2284, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x101, 0x4) 00:55:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffff}, 0x106, 0x100a}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r2, 0x3}}, 0x10) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000100)=""/18) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:14 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x335c70) [ 198.571542] sd 0:0:1:0: device reset [ 198.623940] sd 0:0:1:0: device reset [ 198.665181] IPVS: ftp: loaded support on port[0] = 21 [ 199.436315] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.442773] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.451166] device bridge_slave_0 entered promiscuous mode [ 199.489485] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.495931] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.503384] device bridge_slave_1 entered promiscuous mode [ 199.541909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 199.579680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.691962] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.733623] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 199.909074] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 199.916823] team0: Port device team_slave_0 added [ 199.943768] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 199.951812] team0: Port device team_slave_1 added [ 199.988819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.029371] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.062664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.091523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.365695] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.372088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.378741] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.385114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.392534] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 201.528199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.539626] device bridge_slave_1 left promiscuous mode [ 201.545517] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.565338] device bridge_slave_0 left promiscuous mode [ 201.571201] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.572283] team0 (unregistering): Port device team_slave_1 removed [ 203.582382] team0 (unregistering): Port device team_slave_0 removed [ 203.593933] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 203.609075] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 203.637793] bond0 (unregistering): Released all slaves [ 204.696565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.825043] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 204.952915] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 204.959180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.967593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.098387] 8021q: adding VLAN 0 to HW filter on device team0 00:55:21 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000140)={0x7, 0x33, 0x2}, 0x7) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000100)=0x1e) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:21 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:21 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0xfffffffffffffff7, 0xfffffffffffff001}) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/dev/sg#\x00', 0xffffffffffffff9c}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @ib={0x1b, 0x51, 0x6e4, {"17a5804a42d4a09790a2a25c44144e91"}, 0x8, 0xd337, 0x5}}}, 0x90) 00:55:21 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x244140) 00:55:21 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) [ 205.915607] sd 0:0:1:0: device reset [ 205.961405] sd 0:0:1:0: device reset 00:55:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:21 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) unshare(0x20000) 00:55:21 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 206.026343] IPVS: ftp: loaded support on port[0] = 21 00:55:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:21 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x101d0) 00:55:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:55:21 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) [ 206.193895] sd 0:0:1:0: device reset 00:55:22 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) accept4$packet(r1, &(0x7f0000000200), &(0x7f0000000240)=0x14, 0x0) sendto$inet6(r1, &(0x7f0000000100)="329eb967802840743a5c6cb2d8044dfca76e9830991728e19b113e7bfbf670c7762eb9014d387387398bb080e7535664e25b42277ebe664f182ccc64da2a12b80a8040d70e6af5c3007acfe00b54d7b2c35ad7d989c2afeea52e35b8ba73467dc677aad5b9b4f19043b2be80c7cc10659ff88d3d5eefaaa15ca489fd55ca0a533f7ed9076822c1066dee637807aea5050ae20704a8ebb08cac18dd62144d5b3e6c6be28ff7767640f8fa8f3b7b481f8589e27d1cbd17eeac5af276f2a978a7ff1154578e1407e8899cdf4b4ae3d152710c11589d485d9c19", 0xd8, 0x40, &(0x7f0000000080)={0xa, 0x4e20, 0x689, @empty, 0x9}, 0x1c) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f6", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xc96a80) 00:55:22 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000100)) r1 = getpgid(0x0) ptrace$peek(0x3, r1, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, @multicast1}, &(0x7f0000000140)=0x10, 0x800) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000200)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 00:55:22 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:22 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x7fff}, @in={0x2, 0x4e21, @rand_addr=0x9}, @in6={0xa, 0x4e22, 0xc41, @dev={0xfe, 0x80, [], 0x12}, 0x3}, @in6={0xa, 0x4e24, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x3ff}, @in6={0xa, 0x4e22, 0x8001, @dev={0xfe, 0x80, [], 0xc}}, @in6={0xa, 0x4e23, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x401}, @in6={0xa, 0x4e20, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x1f}, @in={0x2, 0x4e22, @broadcast=0xffffffff}, @in={0x2, 0x4e20, @loopback=0x7f000001}], 0xd8) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:22 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d694776637075736574"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000001c0)=0x2, 0x4) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)=0x1) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x103000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000140)=[{0x3, 0x100000000}, {0x0, 0x7fff}, {0x3, 0xffffffff}, {0x7, 0x1f}], 0x4) 00:55:22 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:22 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x8000) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl(r0, 0x2284, &(0x7f0000000080)) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5271, 0x40) [ 206.858448] sd 0:0:1:0: device reset [ 206.910480] sd 0:0:1:0: device reset 00:55:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x100000001, &(0x7f0000000240)="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") 00:55:22 executing program 4: open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:22 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x5ba4f0) 00:55:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:22 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xfff, 0x222700) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x6, 0x80) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000080)) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x4, 0x200) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x70, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x81, @loopback={0x0, 0x1}, 0xa4d}, @in6={0xa, 0x4e24, 0xfffffffffffffff7, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in6={0xa, 0x5, 0x10000000000, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, @in6={0xa, 0x4e24, 0x5, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x10000}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={r5, 0xa87, 0x3, 0xffffffffffffc421, 0x9, 0x3, 0xffffffff, 0xfffffffffffffe01, {r6, @in6={{0xa, 0x4e21, 0x100000000, @remote={0xfe, 0x80, [], 0xbb}, 0xffff}}, 0x5, 0x1ff, 0x7, 0x7, 0x3}}, &(0x7f0000000340)=0xb0) ioctl(r2, 0x2284, &(0x7f0000000080)) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000040)) fchdir(r4) [ 207.087153] IPVS: ftp: loaded support on port[0] = 21 00:55:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 207.207743] sd 0:0:1:0: device reset 00:55:23 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) [ 207.254598] sd 0:0:1:0: device reset [ 207.360572] 9pnet_virtio: no channels available for device ./file1 00:55:23 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:23 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsz', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:23 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x44000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e23, 0x80, @remote={0xfe, 0x80, [], 0xbb}, 0x8001}}, 0x9, 0xfffffffffffffa3d, 0x5, 0x3, 0x6}, &(0x7f0000000a00)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000c80)={0x0, 0x30, &(0x7f0000000c40)=[@in={0x2, 0x4e23, @multicast2=0xe0000002}, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in={0x2, 0x4e22, @multicast2=0xe0000002}]}, &(0x7f0000000cc0)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000002180)={0x0, 0x100000000}, &(0x7f00000021c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000003300)={0x0, @in6={{0xa, 0x4e23, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}, 0x5, 0x1000}, &(0x7f00000033c0)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000003e00)={0x0, 0x7fb5, 0x4}, &(0x7f0000003e40)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000040c0)={0x0, 0x4}, &(0x7f0000004100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000004140)=@assoc_value={0x0, 0x100000000}, &(0x7f0000004180)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000041c0)={0x0, 0x4, 0x4, 0xffffffff, 0x8cb, 0x7, 0xe1, 0x2, {0x0, @in6={{0xa, 0x4e24, 0xdb, @loopback={0x0, 0x1}, 0x5}}, 0x800, 0x10000, 0x5, 0x5, 0x3}}, &(0x7f0000004280)=0xb0) sendmmsg$inet_sctp(r1, &(0x7f00000043c0)=[{&(0x7f0000000100)=@in={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000140)="c4a176de78eb555eed0fac1680400479efe24ac51f34ccf4d28fb8032d7a80f5663cdb2b51818c74183a9bf6a5a8f2bb", 0x30}, {&(0x7f0000000180)="275e2dfd46b5b0ef7230d7e31e1f99fc138e558c06099f5c256bbc6ff365cde4c4a9b064ca63d87f6cb7644c9e6e33cc62fb417b3b76daaca302298bdfe55b032941d850d562d01791f6d961d636d77fbd9aba1362919ef9b794c27371958c1f9962e3140b3f6ac4c3a9d6c6ac9a94", 0x6f}, {&(0x7f0000000200)}, {&(0x7f0000000240)="df59450cb31971a57315d9085452a7f78ff436f9102f34813cc61fc52f8c8b831c103e3c9f30a7bb916e3b668a0b2dbbcbbb31214db339d568d96ba8006721529cdde4aa11432b2929ea42f30b04874437ef8359f05e4d29351e8bee4d62c489cafeccb74b19e258b3d4fca5dd188385369011da4865737c85655f9b7a64653a7e63b449517b236e5eceb6e87fbd3563ece8e6e6700b775633bf4d864357a11a2a5caa677305cded68112ef3d518bacf65e801e42f9036f3fca3eb204bca57a56edf9d719dd2b84abe5249529dfac7bbb4", 0xd1}, {&(0x7f0000000400)="ba0e1f1d620fc211b9cc4c552236e6e00e0034752dff330b58a5c202f77fa02f82c5ff64e908eaa2303aed2b661424f4c32c8b2d018d798b2da478f0e09435bd44c7567039c330b211f41680fbaa5ae203b9104d1fb872d8496a815dbf180a457af1a9ab2208eda308632c42eeb1", 0x6e}, {&(0x7f0000000480)="4633b2a1ef1019a77057bfc38481be6d275144a4d37f365aefce3d6d9f825e314664fc537e60240e39240afeaa7114068e9c6b7021cc9f9e3eea3fb7cacee8a883a9aa67be529b1c5aaab5fbfd4b97dae38e9362244ccc5c4a7f833851f261d6bc49c61954eb64726abc3c3dfb49eae725bdb6666b7f99d6d06ab391a525c3d51191461077f77692cd6a10e98b7262b22d2aa00032cbb4b9862dc84c494829b8a95605c5c554cbe880e12b7a53", 0xad}, {&(0x7f0000000540)="97cf80310b594b1ecd086b34178ffe893f8ba830bbd4dd6db887f4e49d903077fd732fe3ef7aa0fcad578fa0ba6c1b0a0f69e8ca80fc19a88bb63b36eed1d10d2bfa94afe9aff6ef4a5807043c7122aaa83f32856c1e949d7ac2a2c60f56faf156710add89689baaae2b70e391a2ddc6cb2141c3e918e8593eaf417635fd94b9584176987e8f4580ea3ec5af8d1bbab051a5be4327018f0806294917fb8286ff09f537e27fd097bd431dc2cb0798da2f41ec27b9bc8c0e8ec0674f06c76f4175bbc61a97f04e737752c0cc80c608fa15a1333ea00e193f7b3eb3e8ee38c836369e1e7604c296dc57110d32cf", 0xec}], 0x7, 0x0, 0x0, 0x1}, {&(0x7f0000000340)=@in={0x2, 0x4e21, @rand_addr=0x4}, 0x10, &(0x7f0000000900)=[{&(0x7f00000006c0)="0f28b4cd5bf885a2522cd78345a4b013540ad54d1e746a7a12a22026047c77006d6f1cde23b877c88e04514c8a0c", 0x2e}, {&(0x7f0000000700)="e99a46e82eadcde94e4a51575c6e0b8ac51e89052c8fbf2b625803905825b8b11c2b2e0adce8e20147ef1a09fbbc11512d6d3e966f750937cdb5afce2c247beeb583fd37df16e226d853a460c425d89b0b9377b2fcac489b6b33c5c271e05877bc1152c4b737021dca54c0236fa625002a424e6a662fef331169558b06ad6e33463da8d9d290e93f2e9bdd8550895648579330cb8c3cc2687d8fa5bda649cd72bc1fc36e15507382b076cacb2b381c00a43e9faec2dbb9ddba28f39fb907b0deba47c8dec31431f8b1bcc22dcc96", 0xce}, {&(0x7f0000000800)="0a3a970c715b2b5dcc1cbc7bb51e9908eb59eece22465df80d0f68157e8f8e983812c03bb89d0d404a7d56b2cc29404d11feb52d561b2e0a95f8153bd8fc6e22fb133b461af961866f7c129da0a497c3331b234ecb805aa7ac43837de4c2124f819c5c3a632807b009b3233299f94551ddd59efa6b4ce2c2bec2994d5e5c9c7862e466ecb27f128f7e67f35eccdf2fe704f35df7af1654d452a669b49443ee837150c03b73ad264c76d158fd949151cd405cc8bb89facd69f5b33065e2009fc5a5501a31426e3b976a9f", 0xca}], 0x3, &(0x7f0000000a40)=[@sndinfo={0x20, 0x84, 0x2, {0xffff, 0x8203, 0x5, 0x1, r2}}], 0x20, 0x40}, {&(0x7f0000000a80)=@in6={0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, 0x1c, &(0x7f0000000c00)=[{&(0x7f0000000ac0)="8f7a025fde6c880378c332724017c8c860a3c7221b26a5604aa51c7bfebfb3e03ed6d1d3a7ece8e87f475123acd384c6c92294d5665956ea7baecda21a522ad927af10f9b2c1f9b4c1b3e21471c6100f2359ce2a8513a8cc95997f6961d9cfbf4fccd869f5068df989876e", 0x6b}, {&(0x7f0000000b40)="2c5537c2d94cf40aaf9f5a9d2456af6e3b91db54b9a6e37e3b7ff3373093319a1fa5815c895dee5448a288f948249413ea0f00439300c95bb6e14b53c52c100034dd8177bb13b1bf3706f76f7900789ab2819996ff0be613b0f4cde7f69f85f5295c8f469c90724df87dcbfdd8989a0010f3f9d7531cef1ed5e7fc81905ae8677b6bd9c9cdb8694f749274062f90176e2683a5bb673b794a6e6b2575ab0dd6d374e7d224962be11a263566c68cf42b24fcd9f695f7a3", 0xb6}], 0x2, &(0x7f0000000d00)=[@authinfo={0x18, 0x84, 0x6, {0xffffffffffffffff}}, @init={0x18, 0x84, 0x0, {0x2ce6b3d3, 0x6, 0x6, 0xa}}, @init={0x18, 0x84, 0x0, {0xfffffffffffffff9, 0x6, 0xaf, 0x5}}, @sndinfo={0x20, 0x84, 0x2, {0x8, 0x209, 0x2, 0x8, r3}}, @authinfo={0x18, 0x84, 0x6, {0x8}}], 0x80, 0x10}, {&(0x7f0000000d80)=@in6={0xa, 0x4e23, 0x4d17, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, 0x1c, &(0x7f0000002100)=[{&(0x7f0000000dc0)="d9fa6a1a0062a69e9115baa996230ff7416a1d", 0x13}, {&(0x7f0000000e00)="ef6c0b7e2d2750d9276f78af57e2c3097aa959c272463c56179d12af0d6b132f059f8f612105a33f59b72c00e0f6265b002681469404d0de1c822cd4736100edd8e44ddc8ba14fa91eadef32", 0x4c}, {&(0x7f0000000e80)="90cdddd7b4d7f5639de6b60c517d15215f69419883a3bb3cbde4495d4a114a518fbd3f643dfe1a8cf1c4a8c5f1bad3a08454020a4b6bb8befee0f8842beae79b3307021f023856a8b0ceca93b4eeea3c50220472323cefaf42e317ccf99993030afac58cbe2b4330c80b8986f9a923162e8fe972c17af5b05a52f5cc9187888b67465ae4fb87728548b1b8ba089b2d4198841c006cdc4cafe4abe9f8054428bae2bc8de23a2e3aa58cb8ee5b489d6069acd12cb8de616b62afb445c36a9466c1cd0d8880485f37", 0xc7}, {&(0x7f0000000f80)="cf14a663b0dfea135e28", 0xa}, {&(0x7f0000000fc0)="b64ccf35909eba250cf732ff261a149fd3f422cefff53a037fc60c072690dea8f801a7b68f1522799b4d73", 0x2b}, {&(0x7f0000001000)="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", 0x1000}, {&(0x7f0000002000)="eb001c0ecf8ec12c3f4ef6b5f50fbd74d1dbe1ca49e287ac0467b356c474c8f9affd01", 0x23}, {&(0x7f0000002040)="9079c89c9cc4a23595b8b2589c694558dbc50f5d358010b0cb26c420e9eaaf278f74d2ab309de5e186b7fbf2e64455714198a77f4cbe5b830c32fec5bf8bf72af6881fd70bc2b241a69963246967e06e113630b921d8862603b24774459b91655a63bc687b041dbecbfcebc341ed36263cfbfdaf694dc6e39627f7541013263db292", 0x82}], 0x8, &(0x7f0000002200)=[@sndrcv={0x30, 0x84, 0x1, {0x4, 0xc0c8, 0x200, 0x9, 0x9, 0x7, 0x1, 0x2, r4}}, @dstaddrv4={0x18, 0x84, 0x7}], 0x48, 0x4000000}, {&(0x7f0000002280)=@in={0x2, 0x4e20, @loopback=0x7f000001}, 0x10, &(0x7f00000032c0)=[{&(0x7f00000022c0)="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", 0x1000}], 0x1, &(0x7f0000003400)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x401}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x7ff, 0x2, 0x1f, 0x18000000000000, 0x80000001, 0x4, 0x4, r5}}], 0x48, 0x4004891}, {&(0x7f0000003480)=@in6={0xa, 0x4e20, 0x74, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, 0x1c, &(0x7f0000003780)=[{&(0x7f00000034c0)="d4ac011c55331d37fb136ae0407977b1516ae792ed1cf7a155229a06bf1bf0d97865671c25fe8a0b7495a71a55f498c7456202d4cb6271f88e5c13689e1ae54bfbc3d268dab609433727df01d9b12a5de1dcb262110674da9bd4b18a4a81a7dc411624b5c47641379d33772e45110f6680d62ddc", 0x74}, {&(0x7f0000003540)="49e4b1401555866d9173dcbb30c4dcc3a22761f8c45cb9cb0b1610c51d3e2a92eaa23f4ad9e1e24fa0299bf9edc891825d9024eabc51007669c82b12508bb734504050bcf042154ec0dca02c108f7f3cc811be40435c4643aa", 0x59}, {&(0x7f00000035c0)="2ce6d93d74724f5f9659cc8623bc98dae51113c5e6b6f9ef6a702e324222456c9d4ca8197206fc3e5d726fc37f3701f708f3f190066600283d0aeed92229a536e550dfd8e4e679b70e2b2f9c8fddff4de557f08b859bd912bf362db2b2fac8a90b980a45e50cd7b69d6b3699c76acadee94f319ee5f12fdd37fb7cd6ac9272a45fb4557687d6dc5dda55cbc452cfb7350e693d05df51701b19b7438d72b252d79c65f8d8698c6f0acbc186bbf77e2b6d54f275ee81d4344ae5100e824fb36fc3591707d8b46923c16e9440412b66", 0xce}, {&(0x7f00000036c0)="aff45730b4ec44c8d644a8569cb56356f9c2c242f0cbe202453a73d12637b8ba62c8a42ee35b81c1c93fed77a692f1f68e60212a210dfae45dd2e4bd0ad874453aff8458f7118c58511a42233cf007ab4a86ed9210f06816631aae80f6f04342961b140eb59d23757247897eafb909879b9674fece1faa57725bf1deb41ddf0e4229c2b21021a6b7f5b0166923160285c64504512f1b759e8d4b", 0x9a}], 0x4, 0x0, 0x0, 0x4}, {&(0x7f00000037c0)=@in6={0xa, 0x4e22, 0x9, @empty, 0x2}, 0x1c, &(0x7f0000003bc0)=[{&(0x7f0000003800)="2c5f27d1a08fd327e921671fa57c0a8993bfd2f0c7bb95443c0320221ca15759fc80a792b61f765f7d4b2ab73fb88af762740004b2", 0x35}, {&(0x7f0000003840)="7b53bfc38e7029bdd75f7963915e4eae29679baf3295", 0x16}, {&(0x7f0000003880)}, {&(0x7f00000038c0)}, {&(0x7f0000003900)="4aa0706ef26b89476b4d11055da58f881979618e29fd79f7797bae8738832869167a737f84e08db78ee83e17fe78c70cc1d71fc65a09196fac26533de4cd486ff3a8ba8cafc921e93963792a16439950d63233fc92c3658b009913186ff0a01453d3b51b24eabf1b559322d2495ff6ede065b45dd83f8b5935982a16b1c7e0deea9bcea2348939eb0cf41c66362460803c11c2373a25bbf0e797da0aeb08290adf", 0xa1}, {&(0x7f00000039c0)="7d1672ff538be603e38b85bf00200d6b2ffa007c44dae3c9ab499c2c8764dc8e68f5508e574c6f8554ee6f0d76e01bf75724223b5006790d2cdcf5d69266c9e4d2295a46f536504afe70033a2b9d70e97edde51e9daddea1c7a2c98f579b8cda255bbbda3f0fe7eb387995be547ba06c35c0c123be56d48a17e5af15aba2d0bdee01db505193df7487f0c4f33334d7002e77020cfa0c815d2d98d3ac12f2d1e5a2150e78dcc8c32d2bf24ef009de87e9fbb71658bb982dbaaadf03", 0xbb}, {&(0x7f0000003a80)="271bda89994827bc85c35b55083ad2a35a8d4686415ba37a7d1d3850b6a4e0b7b61f532c036a3181e796b95537bfc2c43cbd808cac0cfd7f260c78745d47b0b8d25654e6732a2d663b6e846c1bdb70406dfabd3c7307b542e9a6fa129828a93473", 0x61}, {&(0x7f0000003b00)="eadeb30903df7158c779694684f9c0cd6d1d12309d9a763137641015c46c9132607a3b24c1174b7e5e5cf76b7420b19d348c0f47df500068cac132c6d5270aebb2fa2ab70e75c820d7f302f061f72a60010e7c22f9e58bf174cc3867ae1c3635b071c4e245dbf82be4136656a861c1461c6c4c0508914c6a6ce965c5f8e519ee7b8236c69a6a353f348d12373e70407f0e0ab1beaa728a", 0x97}], 0x8, &(0x7f0000003c40)=[@init={0x18, 0x84, 0x0, {0x28d, 0x8, 0x3, 0x10001}}], 0x18, 0x20000004}, {&(0x7f0000003c80)=@in={0x2, 0x4e22}, 0x10, &(0x7f0000003dc0)=[{&(0x7f0000003cc0)="ce133262bc3537c97eb1a18ed6e5ad361cdadda73bd49e22802fb56df6493056cef537e2a0368eb8f79787ea0553e6a9d9b52eff4e86f45dbcf0c3132215e22733220bd60c7943718e168a9a28c56f2a690d3f9c0a87098f5a473120c86201f657fe3c91b6dc", 0x66}, {&(0x7f0000003d40)="c59151d62fc86d86362b0b59f156696685014b84dc2eb3a68c62d3c554e3f34f8133e6e29239e6b2766f91f13e736974208a553d859356529dd46f696adfe0e4d9af48ca148e5ad3ad15e9bfe82507d9eaf8bd7145946f77b2413c", 0x5b}], 0x2, &(0x7f0000003e80)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0xfffffffffffffff9}}, @sndinfo={0x20, 0x84, 0x2, {0x81, 0x800c, 0x5, 0xffff, r6}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x3}}], 0x68, 0x800}, {&(0x7f0000003f00)=@in={0x2, 0x4e22}, 0x10, &(0x7f0000004080)=[{&(0x7f0000003f40)="8a0d3d57f20046ae898e649c4a15924058bf", 0x12}, {&(0x7f0000003f80)="8fed2fd0953bf25ba48f2f305f4a5159a8563ecbada0280e5c30e85246cda9ed55c8da5bebf5d6555fbfc9511f84eea0550f0ef4d624480a2b3aaf0b7d63a82a153c97b49d6679dd5e7145d7c66f454119a2bb5cce4c7ac0667c1cf9b5a64e7a7d179abc7a4f034906edd2baa584150af3b069823a6ee59ba244f0f99e1bdafd750995f76f2c343d4781ff455f196e0e7a207fbe92913cc0a50c0c36f9b76d548193f618af493c99e3f0e4ee7e60fd2b4c7457ecded65882d28f67e8795ba211c7f57b80d0", 0xc5}], 0x2, &(0x7f00000042c0)=[@authinfo={0x18, 0x84, 0x6, {0x1}}, @dstaddrv4={0x18, 0x84, 0x7}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0xbb98, 0x2, 0x3, 0x3bff, 0x100, 0x6, 0x6c, r7}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xf9, 0x0, 0x7, 0x2, 0x195, 0x5, 0x4, r8}}, @init={0x18, 0x84, 0x0, {0xcda8, 0x7fffffff, 0x6, 0x9d}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8000, 0x7f, 0xa, r9}}, @authinfo={0x18, 0x84, 0x6, {0x4}}], 0xe0}], 0x9, 0x20000800) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:23 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000100)={'trans=unix,'}) 00:55:23 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xc05a30) 00:55:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 207.618413] sd 0:0:1:0: device reset [ 207.647300] 9pnet: p9_fd_create_unix (14959): problem connecting socket: ./file1: -111 [ 207.699154] sd 0:0:1:0: device reset 00:55:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 208.212154] IPVS: ftp: loaded support on port[0] = 21 00:55:24 executing program 5: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000140)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$evdev(r0, &(0x7f0000000080)=[{{0x0, 0x2710}, 0xffff, 0xe985, 0xb13}], 0x18) ioctl(r1, 0x2284, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) sched_getscheduler(r2) 00:55:24 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsq', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:24 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1e3660) 00:55:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0x2a5, 0x20008008, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x0, 0x0, 0x10) 00:55:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:24 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername(r0, &(0x7f0000000040)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$getownex(r1, 0x10, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000500)=0xe8) getresgid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)) sendmsg$unix(r2, &(0x7f0000000680)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000200)="bb5992891871886edc75395028ef9566538f6b6c86e198213333a29ed3b35a87d107798467a1cc0da2c697ef56a007588f0ec9e44139d0e1ff01679b500e0357b00a5da700cb75e5a5d3e9f2fa651b286c21d524de0df1fa8e13d85dec249291e436d9ea34f66b6163dd8535711c4e3c11c7a030c9546d5b0bb50382a413bdd0c6e1bdc438e79b2bb8c6854c6c74db4218669e496d6c2fae855a047ff4793dc690e2b9912f5d3d7e7ecdd3d41f5c6d0ffea78201d87206452b633fcb785a4355d39f1c0d7773", 0xc6}], 0x1, &(0x7f0000000600)=[@rights={0x30, 0x1, 0x1, [r1, r1, r0, r1, r1, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x50, 0x80}, 0x40) ioctl(r0, 0x800400, &(0x7f0000000140)="d1fdf0ffffd35d97e34565abc121a693e4d0aa0a96bf249db64604a584c81a58b79476e75e8b0000000000000000000000000000000000000000000006") 00:55:24 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x0, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) [ 209.236991] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:55:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xfffffffffffffffd, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 209.302205] IPVS: ftp: loaded support on port[0] = 21 00:55:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x88f680) 00:55:25 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) socketpair(0x6e527c5264b23dd7, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e24, 0x1ff, 0x4e22, 0x38d00000000000, 0xa, 0x20, 0xa0, 0x3b, r2, r3}, {0x5, 0xffff, 0x8001, 0x3, 0x1, 0xff, 0x2, 0x80000001}, {0x100000000, 0xfffffffffffff000, 0xb68, 0x4}, 0x4, 0x6e6bb3, 0x3, 0x1, 0x3, 0x1}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4d5, 0x33}, 0x2, @in6, 0x3503, 0x0, 0x2, 0x400, 0x9, 0x92}}, 0xe8) 00:55:25 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f5", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="627472667310", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xff, 0x800) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x802) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x3, 0xfffffffffffffffc, 0x0, 0x9, 0xfffffffffffffc01, 0x1, 0xfffffffffffffff7, 0x80000001, r3}, &(0x7f0000000200)=0x20) ioctl(r2, 0x4e4b, &(0x7f0000000240)="3b13d46551b51b05ce9ece2f990b1b3c0c82a0ed8cce5b63dd91cf196711709d8937969c868f1fc7a3c3bf0d9251412159cc9e38d2924984312b0921bee2fe617817c77abaccfaca290aa81a4906bd4d81f60eeab00178f712e7d850d4050b9a4a574ad4b40993dceef8dbd2861e27a4bdd8afc0773d00cd7c603a8915edf41a12354e651f0a9751876f342dfa9cef4ff0af1ef450927adc7d77392a2220a7032f494f165ce42086001d24a7037293b57d3f70417deb9b10383d22e5f0fe7b3fd2d3c44852e119bf03e8e184d5fc7a7caeace07bc295dadc2974b85bcc270286e7505d51897d7fb07dac6c") ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000400)={0x2, 0x7}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='vboxnet1\'-vmnet0:eth1@\x00') 00:55:25 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000680)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r2, 0x40047451, &(0x7f0000000000)=""/174) r3 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000240)={0x2, 0x1a, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3793, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x20000, 0x0, 0x40, 0x0, 0xffffffffffffffbd}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x100, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000380)={[0x6000, 0x10000, 0x0, 0x5000], 0xff80000, 0x8, 0x80}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='$\x00', r4}, 0x10) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:25 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x7) [ 209.689292] sd 0:0:1:0: device reset 00:55:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f4", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 209.761512] sd 0:0:1:0: device reset 00:55:25 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x5eaa60) 00:55:25 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:25 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000100)) r1 = getpid() perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, r1, 0xd, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:25 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000040)) 00:55:25 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x7, 0x0, 0x5}) 00:55:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673c0", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:25 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='westwood\x00', 0x9) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x4000000, 0x100000000000) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:55:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 210.143575] IPVS: ftp: loaded support on port[0] = 21 00:55:26 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000400)) 00:55:26 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='/dev/sg#\x00', 0xffffffffffffff9c}, 0x10) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000140)=0x8) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x9) 00:55:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x80000000000, 0x10001) prctl$seccomp(0x16, 0x1, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x6, 0x6663, 0x3, 0x2}, {0x6, 0x101, 0x1, 0x3}]}) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x1000, &(0x7f0000000040)="a8b02c4accc126bb622464ee42ce53aaf3d8884b4ca8ccb19bec601d9a58b701d21d47daf0ae9fd86773360d") 00:55:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x447b40) 00:55:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000000)=0xc8) shutdown(r2, 0x2) [ 210.477722] kauditd_printk_skb: 2 callbacks suppressed [ 210.477734] audit: type=1326 audit(1531097726.271:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15171 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x0 00:55:26 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x0, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:26 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x1) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1cd, 0x102000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[{0x2, 0x8001}, {0x8, 0x2}, {0x8, 0x200000000000}, {0x7, 0x1}, {0x7, 0x8001}], 0x5) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:26 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="62747266738c", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x400) fallocate(r2, 0x0, 0x0, 0x2f07) write$binfmt_aout(r2, &(0x7f00000000c0), 0xfeef) fallocate(r2, 0x3, 0x572d, 0x100) fdatasync(r2) 00:55:26 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x4277a0) 00:55:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 00:55:26 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fb", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 211.016246] IPVS: ftp: loaded support on port[0] = 21 [ 211.372289] audit: type=1326 audit(1531097727.166:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15171 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=202 compat=0 ip=0x455e29 code=0x0 00:55:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f0000000040)={0x7d, 0x20001000, 0x4000, 0x6, 0xd2, 0xfffffffffffffff9, 0x100000000, 0x4, 0x2, 0x80000000}, 0x10) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:27 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18, 0xd, 0x1, {{0x0, 0x3, 0x7}}}, 0x18) 00:55:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x0, 0x0, 0x40000071]}) 00:55:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="62747266730f", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:27 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x9f1e60) 00:55:27 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x0, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:27 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x253}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x8001, 0x1}, 0xc) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 211.646237] sd 0:0:1:0: device reset [ 211.708844] sd 0:0:1:0: device reset 00:55:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 211.762186] IPVS: ftp: loaded support on port[0] = 21 00:55:27 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) 00:55:27 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r2 = dup2(r0, r1) read$eventfd(r2, &(0x7f0000000040), 0x8) 00:55:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000100)={@dev={0xac, 0x14, 0x14, 0x6}, @multicast2=0xe0000002}, 0x8) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="627472667303", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:27 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 212.035074] sd 0:0:1:0: device reset 00:55:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xb44470) 00:55:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) [ 212.274350] IPVS: ftp: loaded support on port[0] = 21 [ 212.321829] sd 0:0:1:0: device reset 00:55:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)="62747266737f", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 212.399580] sd 0:0:1:0: device reset 00:55:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 212.511101] IPVS: ftp: loaded support on port[0] = 21 00:55:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xa1220) 00:55:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 212.594136] sd 0:0:1:0: device reset 00:55:28 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000400)=""/4096) accept$packet(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000300)={@mcast1={0xff, 0x1, [], 0x1}, r1}, 0x14) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000180)={{0xffffffffffffffff, 0x3, 0x1000000000, 0xec245bee85446990, 0x80}, 0x1f, 0x5, 'id1\x00', 'timer1\x00', 0x0, 0x4, 0xffffffffffff6993, 0x6, 0x9}) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) r3 = gettid() perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x9, 0x1ff, 0x2, 0x209, 0x0, 0xd0, 0x50302, 0x1, 0x8, 0x9, 0x9, 0x0, 0xafa, 0x4, 0x6, 0x7, 0x4, 0x1, 0x3, 0x6, 0x7, 0x2, 0x77c, 0x25, 0x718, 0x2926, 0x2000000000000000, 0xf8a, 0x7, 0x3, 0x7f, 0x1ff, 0x0, 0x9, 0x7, 0x40, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x8086, 0x3, 0x5, 0x1, 0xe0000000000, 0xd39, 0xfffffffffffffff8}, r3, 0x7, r2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001400)={0x0, 0xff, 0x6, 0x10000, 0x7, 0x1ff, 0x401, 0x401, {0x0, @in={{0x2, 0x4e21, @multicast2=0xe0000002}}, 0x1000, 0x251, 0xffffffffffffffb8, 0x6, 0x7}}, &(0x7f00000014c0)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000001500)={r4, 0x32, "a8c1660973a0833c15097c4da9aea0d6e1abbda39eb579fc05fad4d4105e5732f2a7d1a99d63c64b210c0732dd1ec1eb758e"}, &(0x7f0000001540)=0x3a) fcntl$setownex(r0, 0xf, &(0x7f0000000340)={0x0, r3}) 00:55:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x203a0) 00:55:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x0, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x5294a0) 00:55:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000100)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x1) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = shmget(0x1, 0x4000, 0x54000000, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) 00:55:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:28 executing program 6: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xedca, 0x80) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000180)={0x4, 0x101, 0x68, &(0x7f0000000100)="5cdd9adf4c76a7c54b4fab4782502207e976fb1350a4d2f1b3281232433bbca5b89ccf00b70897dc2b022c67f97f9a87da7244152b7abd79a06a85de414a432da1ca6415f32c40ff320f49904dff741894bd0bd9e2a66b6a795ee43f76b4296e4019c6b185c0489c"}) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:55:29 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x4102, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000180)=0x2) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x44000) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000140)={0x3, 0x8000, 0x7fffffff, 0x494a1110}) [ 213.269091] IPVS: ftp: loaded support on port[0] = 21 00:55:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000080)) 00:55:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x80000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x5, 0x100000001}) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 213.446366] sd 0:0:1:0: device reset 00:55:29 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x6ac020) [ 213.498832] sd 0:0:1:0: device reset [ 213.512269] sd 0:0:1:0: device reset 00:55:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x0, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x2, @loopback={0x0, 0x1}, 0x4}, @in6={0xa, 0x4e21, 0x27e, @mcast2={0xff, 0x2, [], 0x1}, 0x1060000000}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e20, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x7252020e}, @in6={0xa, 0x4e21, 0x8, @loopback={0x0, 0x1}, 0x8}], 0x80) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000180)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 6: r0 = socket(0x11, 0x5, 0x2) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x224020, 0x4) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x44, 0x0, &(0x7f0000000100)=[@exit_looper={0x630d}, @clear_death={0x400c630f, 0x1, 0x1}, @request_death={0x400c630e, 0x3, 0x4}, @request_death={0x400c630e, 0x4, 0x4}, @increfs={0x40046304, 0x1}, @exit_looper={0x630d}, @exit_looper={0x630d}], 0x8b, 0x0, &(0x7f0000000180)="3152238501b665a0f70e9e0ecd35ee33a56c137820b1fd793f7e2a576ea6e60ced4a3abe3f98537f39313c6291520a52d39a22aa307f48f9cc0aefd0794a9dca2ff24e26d2878c43c62c69831afc2b63aff3dc40ecf237a01170dfceb9de74883eb577201c929d47faa7775b373e10a5e3bdbf35f5cd1140e81b5f7707a39cd9eb3fd4dbbede229ee2d4ff"}) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl(r2, 0x2284, &(0x7f0000000080)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000280)) 00:55:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 213.852225] sd 0:0:1:0: device reset [ 213.928867] sd 0:0:1:0: device reset 00:55:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs#', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 6: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="b5000000", @ANYRES16=r1, @ANYBLOB="000a25bd7000ffdbdf250300000008000400000000000c0003000800030000000000080006000300000008000600ff0300005c00010008000900280000000c0006006e6f6e650000000008000600646800000800090041000000080004004e24000008000b00736970000c0007000a0000000800000008000b00736970000800060077727200080005000000000030000100080009005f0000000800080000800000080009005a0000000c000700080000002900000008000100020000000800050000000000"], 0xcc}, 0x1}, 0x24004800) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x400000000000) r3 = geteuid() r4 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r3, r4) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000300)={0x0, 0x5, 0xfffffffffffffff9, 0xfffffffffffffffe, 'syz0\x00', 0xdde7}) fallocate(r2, 0x48, 0x3, 0x2001) ioctl(r2, 0x2284, &(0x7f0000000080)) 00:55:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:29 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0x2284, &(0x7f0000000100)="58b6414dcadde17f7f849b3b79ae1e4bb758b65b417bdffc97effe459af52a3ed189ee3953485a5a3907c6959b16a21eb0a4d46b93702f87f0fb5a0e62ca653f92f2351f5787e445f622cdba09258198") [ 214.120425] IPVS: ftp: loaded support on port[0] = 21 00:55:29 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xaf3b60) 00:55:30 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000100)={0x9f, 0xffffffffffff0001, 0x1, 0x700, 0x3ff, 0x6, 0x1, 0xffffffffffff0001, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000400)={r2, 0x1000, "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"}, &(0x7f0000000180)=0x1008) 00:55:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000040)={'veth1\x00', 0x7a}) 00:55:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x10100) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0xfffffffffffffd79, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x800, 0xab, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x9, @empty, 0xae}, @in6={0xa, 0x4e23, 0x85, @mcast2={0xff, 0x2, [], 0x1}, 0xc73}], 0x38) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r2 = shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000400)=""/4096) fcntl$setflags(r1, 0x2, 0x1) 00:55:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x9d1ac0) 00:55:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 214.892134] sd 0:0:1:0: device reset [ 214.899660] IPVS: ftp: loaded support on port[0] = 21 00:55:30 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x100, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x8000, 0x80, 0x2, 0x6}) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x7, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}]}) [ 214.990600] sd 0:0:1:0: device reset 00:55:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(r1) 00:55:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1e, 0x9, 0x6a1e57ff, 0x2, 0x0, 0x18, 0x8020, 0x8, 0x94, 0x800, 0x8001, 0x3, 0x82, 0xc5a8, 0xcfe, 0x820, 0x2, 0x0, 0x10000, 0x1e2ec0000000000, 0x800, 0xffffffff, 0x400, 0x9, 0x10001, 0xf3d, 0x0, 0xffffffff, 0x5, 0xfffffffffffffeff, 0xe972, 0x0, 0x44, 0x9ba7, 0x6, 0x2, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x378, 0xfffffffffffff08a, 0x2, 0x10000, 0x2, 0x400}, r2, 0xe, r1, 0x2) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x10000, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xffffffff, 0x200000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000100)={0xf5, 0x0, [0x1, 0x9, 0x3ff, 0x1]}) gettid() setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x101, 0x1) r3 = gettid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r3) ioctl(r0, 0x8fb, &(0x7f0000000180)="c50daca7b194a3bf85c9c9fb35ff0be0d4d2261dc804cb") 00:55:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 215.429630] sd 0:0:1:0: device reset 00:55:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x61afd0) 00:55:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x9) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2284, &(0x7f0000000080)) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x1000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x38, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x2000000, @dev={0xfe, 0x80, [], 0x1e}, 0x1}, @in6={0xa, 0x4e22, 0xfffffffffffffffc, @local={0xfe, 0x80, [], 0xaa}, 0x401}]}, &(0x7f0000000200)=0x10) 00:55:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x382, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@local, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000002c0)=0xe8) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[{0x6, 0xa00000}, {0xf, 0x7}, {0x8, 0x1}], 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@remote, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in6, @in=@loopback=0x7f000001, 0x4e23, 0x0, 0x4e24, 0x1f, 0xa, 0x20, 0xa0, 0x32, r2, r3}, {0x1c, 0x3, 0x2, 0x2, 0x0, 0x0, 0x3f, 0x8}, {0x3, 0x1, 0x7, 0xffffffffffffff00}, 0x38ff, 0x6e6bbc, 0x2, 0x0, 0x3, 0x3}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4d3, 0x15544fb612398cb0}, 0xa, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x3507, 0x3, 0x1, 0x100000001, 0x7, 0x8, 0xd1}}, 0xe8) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000600)=ANY=[@ANYBLOB="0100000000000000000000000000000000000000000000000000000000000000e100000082099bba042795d137b16c03a84da97fe35b7808791114f95be24c8237f1323cb49d29986924ca30905f0508135edc3122c5ccf3b3c8d444ea6254b88afda04698c9a4ec6bd23b7765fa58ad38440cb24c54bcd60332caedfc54e319517ba2810552f005e240d551cb21cb7da94ce16d0b21e860ecfa136bde362d70f70b3b5609d358922a957a320ea2c8faf60550bd4d623d65f03179af608931d39c1ed448cb6a1afb0267cf3e53a2a830f470bf72a868d5f389e0a7481b6dc581f67da04aad8ebf332692ab85a482c1aedbd0e0b48408983fb679b4c07bc8673ad9be3d0039"], &(0x7f0000000140)=0x105) ioctl(r0, 0x2284, &(0x7f0000000080)) [ 215.643943] sd 0:0:1:0: device reset [ 215.683782] IPVS: ftp: loaded support on port[0] = 21 00:55:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 215.760139] sd 0:0:1:0: device reset 00:55:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000300)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x0, &(0x7f00000002c0)) unshare(0x8020000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x0) setns(r2, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000240)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./control/file1\x00', 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000240)='em1\'-\x00') write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fgetxattr(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="62747266732e6367726f75706574683075731f426d69477663707573657400"], &(0x7f0000000340)=""/197, 0xc5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x42, @tick=0x7269, 0x5, {0x6, 0x7}, 0x10001, 0x3, 0x3}) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffdfffffffffffe) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='./control\x00') mkdir(&(0x7f0000000080)='./control/file1\x00', 0x0) close(0xffffffffffffffff) 00:55:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfsz', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x200) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x6, 0x20, 0x1, r1}) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r1, &(0x7f00000001c0)="33fd82dda82626ddbb9c36caa77a454aa48b1c97c5fef9743e3f54c74b5bac0aca086230a13802eaa37a61139c791433f683e200e4f38abb71986fa2325c2ed2277c2239c0b72d7b4bd86896fe37da8bbf6620e2369e215c23099422c2d3032bffa12d82600873096b90d64e109873692bcc1db0f1f741bf8f9f4677a8c9919b0266ed31e8554b3abbe30fd46252e06e36e396c4e30ca859b49b1a6f6f691fcefa9aacba9bb14e25741654f5e7cba5d9", 0xb0, 0x8000, &(0x7f0000000280)={0x2, 0x4e24, @rand_addr=0xca}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x600, 0x0) getsockname$inet(r2, &(0x7f0000000bc0)={0x0, 0x0, @multicast2}, &(0x7f0000000c00)=0x10) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000040)) r3 = semget(0x1, 0x5, 0x600) semctl$SETVAL(r3, 0x4, 0x10, &(0x7f0000000100)=0xaf8d) ioctl(r0, 0x2284, &(0x7f0000000080)) 00:55:31 executing program 4 (fault-call:4 fault-nth:0): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:31 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0xd07730) [ 216.182697] sd 0:0:1:0: device reset [ 216.196487] FAULT_INJECTION: forcing a failure. [ 216.196487] name failslab, interval 1, probability 0, space 0, times 0 [ 216.207856] CPU: 0 PID: 15901 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #137 [ 216.215226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.224591] Call Trace: [ 216.227199] dump_stack+0x1c9/0x2b4 [ 216.230851] ? dump_stack_print_info.cold.2+0x52/0x52 [ 216.236061] ? perf_trace_lock+0xde/0x920 [ 216.240257] should_fail.cold.4+0xa/0x1a [ 216.244340] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.249477] ? lock_downgrade+0x8f0/0x8f0 [ 216.253652] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 216.259210] ? proc_fail_nth_write+0x9e/0x210 [ 216.263731] ? find_held_lock+0x36/0x1c0 [ 216.267828] ? check_same_owner+0x340/0x340 [ 216.272173] ? rcu_note_context_switch+0x730/0x730 [ 216.277121] __should_failslab+0x124/0x180 [ 216.281379] should_failslab+0x9/0x14 [ 216.285215] __kmalloc_track_caller+0x2c4/0x760 [ 216.289899] ? strncpy_from_user+0x510/0x510 [ 216.294325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 216.299885] ? strndup_user+0x77/0xd0 [ 216.303710] memdup_user+0x2c/0xa0 [ 216.307273] strndup_user+0x77/0xd0 [ 216.310932] ksys_mount+0x3c/0x140 [ 216.314700] __x64_sys_mount+0xbe/0x150 [ 216.318781] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 216.323798] do_syscall_64+0x1b9/0x820 [ 216.327673] ? finish_task_switch+0x1d3/0x870 [ 216.332159] ? syscall_return_slowpath+0x5e0/0x5e0 [ 216.337082] ? syscall_return_slowpath+0x31d/0x5e0 [ 216.342011] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 216.347376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.352235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.357419] RIP: 0033:0x455e29 [ 216.360593] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:55:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fb", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 216.379950] RSP: 002b:00007f8713cadc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 216.387755] RAX: ffffffffffffffda RBX: 00007f8713cae6d4 RCX: 0000000000455e29 [ 216.395031] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 216.402293] RBP: 000000000072bea0 R08: 0000000020000100 R09: 0000000000000000 [ 216.409552] R10: 0000000000802000 R11: 0000000000000246 R12: 0000000000000014 [ 216.416808] R13: 00000000004c05f1 R14: 00000000004d00b8 R15: 0000000000000000 [ 216.467756] sd 0:0:1:0: device reset 00:55:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 216.533964] IPVS: ftp: loaded support on port[0] = 21 00:55:32 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x9ce29e2, 0x0, 0x0, 0x0, 0x0, 0x1e67, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0xc0000, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext={0x1, 0x100000000}, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl(0xffffffffffffffff, 0x2284, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x100000001, 0x7, 0x2, 0x4, 0x633e23c3, 0x9, 0x307, 0xeb8, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0x8df}, 0x8) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x200) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x7f) r3 = creat(&(0x7f0000000180)='./file0\x00', 0xa) mknodat(r3, &(0x7f00000001c0)='./file0\x00', 0x110, 0x5) 00:55:32 executing program 4 (fault-call:4 fault-nth:1): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x802000, &(0x7f0000000100)={'trans=unix,'}) 00:55:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)="62747266738c", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 00:55:32 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x84ef40) [ 216.788895] FAULT_INJECTION: forcing a failure. [ 216.788895] name failslab, interval 1, probability 0, space 0, times 0 [ 216.800316] CPU: 1 PID: 15951 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #137 [ 216.807690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.817053] Call Trace: [ 216.819657] dump_stack+0x1c9/0x2b4 [ 216.823303] ? dump_stack_print_info.cold.2+0x52/0x52 [ 216.828505] ? __save_stack_trace+0x8d/0xf0 [ 216.832846] should_fail.cold.4+0xa/0x1a [ 216.836927] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 216.842047] ? save_stack+0x43/0xd0 [ 216.845688] ? kasan_kmalloc+0xc4/0xe0 [ 216.849587] ? __kmalloc_track_caller+0x14a/0x760 [ 216.854444] ? memdup_user+0x2c/0xa0 [ 216.858179] ? strndup_user+0x77/0xd0 [ 216.861994] ? graph_lock+0x170/0x170 [ 216.865808] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.871190] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 216.876771] ? proc_fail_nth_write+0x9e/0x210 [ 216.881289] ? find_held_lock+0x36/0x1c0 [ 216.885387] ? check_same_owner+0x340/0x340 [ 216.889729] ? lock_release+0xa30/0xa30 [ 216.893722] ? rcu_note_context_switch+0x730/0x730 [ 216.898664] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 216.903704] __should_failslab+0x124/0x180 [ 216.907960] should_failslab+0x9/0x14 [ 216.911780] __kmalloc_track_caller+0x2c4/0x760 [ 216.916471] ? strncpy_from_user+0x510/0x510 [ 216.920898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.926458] ? strndup_user+0x77/0xd0 [ 216.930280] memdup_user+0x2c/0xa0 [ 216.933832] strndup_user+0x77/0xd0 [ 216.937478] ksys_mount+0x73/0x140 [ 216.941026] __x64_sys_mount+0xbe/0x150 [ 216.945034] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 216.950066] do_syscall_64+0x1b9/0x820 [ 216.953959] ? finish_task_switch+0x1d3/0x870 [ 216.958462] ? syscall_return_slowpath+0x5e0/0x5e0 [ 216.963403] ? syscall_return_slowpath+0x31d/0x5e0 [ 216.968346] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 216.973737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.978616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.983807] RIP: 0033:0x455e29 [ 216.986991] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.006369] RSP: 002b:00007f8713cadc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.014087] RAX: ffffffffffffffda RBX: 00007f8713cae6d4 RCX: 0000000000455e29 [ 217.021360] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000020000000 [ 217.028629] RBP: 000000000072bea0 R08: 0000000020000100 R09: 0000000000000000 [ 217.035905] R10: 0000000000802000 R11: 0000000000000246 R12: 0000000000000014 [ 217.043183] R13: 00000000004c05f1 R14: 00000000004d00b8 R15: 0000000000000001 [ 217.063077] WARNING: CPU: 0 PID: 15945 at fs/btrfs/volumes.c:1071 close_fs_devices+0xbf0/0xfd0 [ 217.071867] Kernel panic - not syncing: panic_on_warn set ... [ 217.071867] [ 217.079251] CPU: 0 PID: 15945 Comm: syz-executor1 Not tainted 4.18.0-rc3+ #137 [ 217.086620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.096515] Call Trace: [ 217.099131] dump_stack+0x1c9/0x2b4 [ 217.102790] ? dump_stack_print_info.cold.2+0x52/0x52 [ 217.108010] panic+0x238/0x4e7 [ 217.111223] ? add_taint.cold.5+0x16/0x16 [ 217.115398] ? __warn.cold.8+0x148/0x1ba [ 217.119489] ? close_fs_devices+0xbf0/0xfd0 [ 217.123837] __warn.cold.8+0x163/0x1ba [ 217.127741] ? close_fs_devices+0xbf0/0xfd0 [ 217.132075] report_bug+0x252/0x2d0 [ 217.135696] do_error_trap+0x1fc/0x4d0 [ 217.139573] ? trace_hardirqs_on+0xd/0x10 [ 217.143728] ? math_error+0x3e0/0x3e0 [ 217.147523] ? note_gp_changes+0x550/0x550 [ 217.151759] ? __blkdev_put+0x3f1/0x830 [ 217.155729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.160562] do_invalid_op+0x1b/0x20 [ 217.164262] invalid_op+0x14/0x20 [ 217.167707] RIP: 0010:close_fs_devices+0xbf0/0xfd0 [ 217.172613] Code: 4a af fe 0f 0b e8 d0 4a af fe 0f 0b 48 89 f7 e8 f6 24 ed fe e9 de f5 ff ff e8 bc 4a af fe 0f 0b e9 fd fd ff ff e8 b0 4a af fe <0f> 0b e9 a8 fd ff ff 48 8b bd 58 fd ff ff e8 8d 25 ed fe e9 35 fd [ 217.191865] RSP: 0018:ffff8801bc957050 EFLAGS: 00010216 [ 217.197227] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90003a5a000 [ 217.204492] RDX: 000000000000c778 RSI: ffffffff82ccc0f0 RDI: 0000000000000007 [ 217.211759] RBP: ffff8801bc957350 R08: ffff8801aae76580 R09: 0000000000000006 [ 217.219030] R10: ffff8801aae76580 R11: 0000000000000000 R12: ffffed003792ae2d [ 217.226286] R13: 1ffff1003792ae1d R14: ffff8801bc9570e8 R15: ffff8801c7c1a048 [ 217.233559] ? close_fs_devices+0xbf0/0xfd0 [ 217.237881] ? btrfs_alloc_device+0x8e0/0x8e0 [ 217.242369] ? do_raw_spin_unlock+0xa7/0x2f0 [ 217.246772] ? kasan_check_write+0x14/0x20 [ 217.250996] ? wake_up_q+0xb3/0x100 [ 217.254628] ? __mutex_unlock_slowpath+0x439/0x8c0 [ 217.259545] ? wait_for_completion+0x8d0/0x8d0 [ 217.264133] btrfs_close_devices+0x29/0x150 [ 217.268454] btrfs_mount_root+0x143c/0x1e90 [ 217.272780] ? btrfs_decode_error+0x70/0x70 [ 217.277093] ? save_stack+0x43/0xd0 [ 217.280706] ? __kasan_slab_free+0x11a/0x170 [ 217.285097] ? kasan_slab_free+0xe/0x10 [ 217.289068] ? kfree+0xd9/0x260 [ 217.292338] ? mount_fs+0xae/0x328 [ 217.295865] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 217.300619] ? do_mount+0x581/0x30e0 [ 217.304319] ? ksys_mount+0x12d/0x140 [ 217.308121] ? __x64_sys_mount+0xbe/0x150 [ 217.312261] ? do_syscall_64+0x1b9/0x820 [ 217.316324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.321686] ? kasan_check_read+0x11/0x20 [ 217.325823] ? do_raw_spin_unlock+0xa7/0x2f0 [ 217.330218] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 217.334788] ? do_raw_spin_lock+0xc1/0x200 [ 217.339021] mount_fs+0xae/0x328 [ 217.342380] ? debug_check_no_obj_freed+0x30b/0x595 [ 217.347385] vfs_kern_mount.part.34+0xdc/0x4e0 [ 217.351956] ? may_umount+0xb0/0xb0 [ 217.355584] ? kfree+0x111/0x260 [ 217.358937] ? btrfs_mount+0x84c/0x215e [ 217.362901] vfs_kern_mount+0x40/0x60 [ 217.366702] btrfs_mount+0x4a9/0x215e [ 217.370492] ? kasan_check_read+0x11/0x20 [ 217.374625] ? rcu_is_watching+0x8c/0x150 [ 217.378774] ? btrfs_remount+0x1710/0x1710 [ 217.382998] ? __lockdep_init_map+0x105/0x590 [ 217.387488] ? __lockdep_init_map+0x105/0x590 [ 217.391971] ? lockdep_init_map+0x9/0x10 [ 217.396106] ? __init_waitqueue_head+0x9e/0x150 [ 217.400758] ? init_wait_entry+0x1c0/0x1c0 [ 217.404980] ? memcpy+0x45/0x50 [ 217.408251] ? alloc_vfsmnt+0x779/0x9f0 [ 217.412210] ? mnt_free_id.isra.27+0x60/0x60 [ 217.416612] ? graph_lock+0x170/0x170 [ 217.420399] ? rcu_pm_notify+0xc0/0xc0 [ 217.424279] ? find_held_lock+0x36/0x1c0 [ 217.428356] ? lock_downgrade+0x8f0/0x8f0 [ 217.432497] mount_fs+0xae/0x328 [ 217.435849] ? btrfs_remount+0x1710/0x1710 [ 217.440067] ? mount_fs+0xae/0x328 [ 217.443591] ? mpi_free.cold.1+0x19/0x19 [ 217.447641] vfs_kern_mount.part.34+0xdc/0x4e0 [ 217.452213] ? may_umount+0xb0/0xb0 [ 217.455825] ? _raw_read_unlock+0x22/0x30 [ 217.459960] ? __get_fs_type+0x97/0xc0 [ 217.463837] do_mount+0x581/0x30e0 [ 217.467370] ? copy_mount_string+0x40/0x40 [ 217.471593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 217.476339] ? retint_kernel+0x10/0x10 [ 217.480218] ? copy_mount_options+0x1f0/0x380 [ 217.484700] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 217.489530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.495065] ? copy_mount_options+0x285/0x380 [ 217.499550] ksys_mount+0x12d/0x140 [ 217.503170] __x64_sys_mount+0xbe/0x150 [ 217.507145] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 217.512152] do_syscall_64+0x1b9/0x820 [ 217.516028] ? finish_task_switch+0x1d3/0x870 [ 217.520510] ? syscall_return_slowpath+0x5e0/0x5e0 [ 217.525429] ? syscall_return_slowpath+0x31d/0x5e0 [ 217.530351] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 217.535706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.540539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.545713] RIP: 0033:0x45885a [ 217.548882] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 217.568118] RSP: 002b:00007fc8fe85da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 217.575821] RAX: ffffffffffffffda RBX: 00007fc8fe85db30 RCX: 000000000045885a [ 217.583090] RDX: 00007fc8fe85dad0 RSI: 00000000200000c0 RDI: 00007fc8fe85daf0 [ 217.590348] RBP: 00000000200000c0 R08: 00007fc8fe85db30 R09: 00007fc8fe85dad0 [ 217.597602] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000013 [ 217.604856] R13: 0000000000000000 R14: 00000000004d3e38 R15: 0000000000000000 [ 217.612742] Dumping ftrace buffer: [ 217.616566] (ftrace buffer empty) [ 217.620259] Kernel Offset: disabled [ 217.623871] Rebooting in 86400 seconds..