0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:52 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x0, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:52 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:52 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x8, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) sendmsg$kcm(r4, &(0x7f0000000400)={&(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000380)="806b3d8dd86d42713423559f22f55d8b43fa4a2ed965f8be826b92b0f38307e634d4d32284a31a4f744fb0ce4f359d7b75d8fbe2102a54247158f50cf4f8a2fadfff5a2caa8354bc9f1c3ab3adc78e2ec9163b7b45f1b19bb4026d009c681f51", 0x60}], 0x1, 0x0, 0x0, 0x1}, 0x40000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) r3 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x3f, 0x400003) bind$nfc_llcp(r3, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x3, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb", 0x4}, 0x60) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:52 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)=0x2, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000280)=@req={0x28, &(0x7f0000000180)={'sit0\x00', @ifru_mtu}}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_buf(r2, 0x29, 0xca, &(0x7f0000000040)=""/109, &(0x7f00000000c0)=0x6d) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @multicast2, @local}, &(0x7f0000000200)=0xc) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)="c6d39111f1", 0x5, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 2033/05/18 03:33:52 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:52 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2033/05/18 03:33:52 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:52 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x0, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:52 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 259.038989] device lo left promiscuous mode [ 259.054343] device lo entered promiscuous mode [ 259.067593] device lo left promiscuous mode [ 259.103267] device lo entered promiscuous mode [ 259.133958] device lo left promiscuous mode [ 259.177816] device lo entered promiscuous mode [ 259.203804] device lo left promiscuous mode [ 259.216712] device lo entered promiscuous mode 2033/05/18 03:33:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) fcntl$dupfd(r1, 0x406, r1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000840)=@raw={'raw\x00', 0x9, 0x3, 0x2f0, 0x160, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f00000002c0), {[{{@uncond, 0x0, 0x100, 0x160, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x0, 0x5}}, @common=@set={0x40, 'set\x00', 0x0, {{0x80000001, [0x1000, 0x8f, 0x4, 0x4000000000000000, 0x5, 0x80], 0x9, 0x85be, 0x9}}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x8c39, [0xffffffffffffffd4, 0x9, 0x10001, 0x847, 0x40, 0x44], 0x3, 0x0, 0x275}, {0xfffffffffffff000, [0x0, 0x400, 0x2, 0xa28, 0x1, 0x8000], 0x2, 0x55, 0x7}}}}, {{@ip={@loopback=0x7f000001, @rand_addr=0x5, 0xff, 0xff, 'vlan0\x00', 'irlan0\x00', {0xff}, {0xff}, 0x7, 0x3, 0x10}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 0x3, 0x10, [0x31, 0x16, 0x35, 0x34, 0xe, 0x2a, 0x15, 0x1a, 0x4, 0x30, 0x8, 0x13, 0x3e, 0x37, 0x10, 0x17], 0x3, 0x6, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x350) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x240, &(0x7f0000000180)=[{&(0x7f00000001c0)="5fab0000000000000000000000000000", 0x10}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x148}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvfrom$ipx(r3, &(0x7f0000000380)=""/55, 0x37, 0x1, 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:53 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000380)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="11"]}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x401}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r1, 0x40}, 0x8) 2033/05/18 03:33:53 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) 2033/05/18 03:33:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x0, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f00000001c0)={0x80000001, 0xfffffffffffffffd}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:53 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x3, 0x4) socket$inet(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) accept4$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x80000) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000140)) dup3(r0, r0, 0x3) 2033/05/18 03:33:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 259.338336] device lo left promiscuous mode 2033/05/18 03:33:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x0, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 2: r0 = socket$inet(0x2, 0x802, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x401, {0x2, 0x4e21, @loopback=0x7f000001}, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x40, 0x0, 0xc4, 0x6, 0xde, &(0x7f0000000000)='lo\x00', 0x1ff, 0xffffffff}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x1, 0x150, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000006c0), &(0x7f0000000900)=ANY=[@ANYBLOB="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"]}, 0x1c8) [ 259.372490] device lo left promiscuous mode 2033/05/18 03:33:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 259.418436] device lo entered promiscuous mode [ 259.431749] device lo entered promiscuous mode [ 259.575841] bond0 (unregistering): Released all slaves [ 259.677168] device lo left promiscuous mode [ 259.691851] device lo entered promiscuous mode [ 259.699365] device lo left promiscuous mode [ 259.712064] device lo entered promiscuous mode 2033/05/18 03:33:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80, 0x101080) r1 = socket(0x10, 0x803, 0x0) write(r1, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) sync() getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) recvmsg(r1, &(0x7f0000bf9000)={&(0x7f0000fb9000)=@sco, 0x8, &(0x7f0000e9c000)=[{&(0x7f000024e000)=""/219, 0xdb}, {&(0x7f0000466000)=""/4096, 0x1000}, {&(0x7f0000b14f72)=""/142, 0x8e}, {&(0x7f0000820000)=""/185, 0xb9}, {&(0x7f0000a77000)=""/243, 0xf3}, {&(0x7f00001b1ffd)=""/53, 0x35}], 0x8a2fe9de8bd0105b, &(0x7f00006d6faf)=""/81, 0x51}, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000fa3000)={&(0x7f0000d0b000)=ANY=[], 0x0, &(0x7f00002e6f80), 0x0, &(0x7f0000878000)}, 0x0) recvmsg(r1, &(0x7f0000355000)={&(0x7f0000d49ff4)=@nl=@proc, 0xc, &(0x7f0000378000), 0x0, &(0x7f000064ff09)=""/247, 0xf7}, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 2033/05/18 03:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000001ec0)={r4, r3, 0x5}) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0xfe7e) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000004240)='/dev/sequencer2\x00', 0x400, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f000031aff8)={r0, r6}) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f00000001c0)={0x400, 0x1, 0xe00, 0x7, 0x6, 0x736}) sendmmsg$alg(r5, &(0x7f0000004140)=[{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="72c8bebfbb8456b997a0478693215ec9786b02c755d63b26cfbb337a0300edcc01b8b1693d32c3875603b5aff1bb362e14706c525b5f2a833b1dce291e7b41934dc097419de68105159fa0a6aefe1e52984cb76c7da88527ad96800c3ab1ea9c800529d61867e5de424c8cb75b9a4ef924614922c9d245108cb7bb8e4413", 0x7e}, {&(0x7f0000000380)="42b34146a3aeeb6c128c3651dd6030f5568ed73bf0a838ad6099025c142e10a6499938da4a392fb9681c71e22fdb3d1cf284586922c0033664671a67562411a74a2b7162e628955fcfa56c15539afb416e722f0a7adf19a27ddb0c32d2b5a48cdbff", 0x62}], 0x2, &(0x7f00000004c0)=[@iv={0xf0, 0x117, 0x2, 0xdb, "ab7a7745183740abae971c755636af37480e469ef88073298b6e893e0863f42f90cd51b46ed2af46ae61ab5ba6f319d28455ade46574f2f65822266988688db6030ab74d5d0f14b02c30481e972d90a3d609349c378f0031ee01655f036ce4b671227cd35ff9091ce178c5cb9037539578efcd8a2ce1c1a571652f83b1f13e6a15cba6a4d09df51c370ba6112eda06077328736c6e61d685dfde022d4658795d9244425530375603babcfd596c54076f48c9ac4c3273644e2e4402c9e117f683492696ea363a41126405d616ba46a107de09be102abf972d44a983"}, @iv={0x60, 0x117, 0x2, 0x4a, "dc63fe2be636efb383ed9865a27c2a58f9de74bd012899e71ce9d1e603f2b27fe52ad6d21c0c07f5ef8bfec6025208893fc03220a3156e4b40d9d479ce4404e810e8310d037a1b9eaaba"}, @op={0x18, 0x117, 0x3, 0x1}], 0x168, 0x1}, {0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000640)="e9d537adf6ba624ed99e14b6a463941fe192c480d030d6325cf08457c86be05781d470b98a30df3c41c133a6ab2aa5ab469f0f5ed9eea51841e1040e543d85888ea9378587148e0c2d1837541d4d3f8a1edd67f6d8882d6539d0fe20a7d08ac21eefbd104f619d8d5d77de225d2a980499504b5489a682fc99b0126b73ab78ea517a533ef753d50c85e86a53fa3091b6e67bfc6f46899c1e30e0a7a325e825de936a", 0xa2}, {&(0x7f0000000700)="2e222b804a2a95766bc40d9152a5f2a5f30c8fecefb6e7747a02e2e52f4ba7e820d84466f000f35205f917113f5fbe3fe25ab8928a70d47820360695d498fedd9c41b8f9294f9286454a885ccb58d23866c5eb464c99286ad03faf520566789accec2e89b54b10220cd6d2f2105c044128d5d304cbb4aa4788590821fae1b5c3024f0c81add4369c8e08168fee9e4ac7f03a67274b87602b271f53311acfde18c1ce1d35e5939672e0038334e9", 0xad}, {&(0x7f0000000440)="dd78a0e712", 0x5}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="c76aa8c57c5c85856c7743e5a12932cb762e43ded1450813d7c09a0e97da6d2229e60108ececbb51346d1e284f9907cb17bce15486e7a2afec3f3de7438980b0c95ac03267db6294a2703c74d77e", 0x4e}, {&(0x7f0000001840)="3a2b457455a499ae3882376c5d7d5af49d3d235c124cea0727aa1efaf7e61c4ee4419bdeef49b3eb7b6335f5793be2c2fe8556dcd69ae7a6c7033474cfe6b3fcb176c59a8500eda4364d50a05c179dcadb8b9b5bf3e719ebef319771b1e61dca469f8160a18b7c52604e305dbf8ad23898980e5bd35837c3a1e7ec309f2bd55bfe6b5c56aa8b838051e27532fc58e9c1ad1c28b31f913e61910cf9a3d38b7a960c83c1b64371b558b02373e2cabd4e32c2f83e6f45", 0xb5}, {&(0x7f0000001900)="7614af0526378df99c50c17e60b875d9cb2ae2dd058d96cb1edb59ee02c1d809d359782dede3dd8302c934c76bc964bbddf323bcc3e08e2020e463752cff5bee14d7a8edf284970f4a3a473a5a36599057eab3bed0e9ff72c72f8cf11a6a227f5c2a29aeb7e2cea3a7e3bc56b4e1c7d8cf0d628ba506c7bc5e6152b5e36d6da9576d953e4d1a525e8a343f72cfb6cda8cf1c334bb1fbb28925b107924cca24f35c6ea6e7eec95276a717daea0e93c75ccb42cc2c356790de6dfa21ec57ae5f44b585e67e89cd54c326e68c350e", 0xcd}, {&(0x7f0000001a00)="3e263033e7a6a246f138a70e6d40b296d54f58497792f005aaba5c2e0f29162b68381ca73dfa71448ed8740c1b2c5d2989db68038f5707e2b602542faa791c1182aff001cac7d6df42578efae47b2de2b315f1784a5bbdd5cbbb1ee2c47be74123d7dcb00a6970474db71faf035b678334ca67b656493401c8f20ae36b6dd19b838233fed9ae25a7e5d7b5e30cb6b7bbdffcce2e9860f91bcae9f6726ac25f7335561cc537469250f1cd8de5c442a09c180d3c2c8bda3f0d93d31b43a63bca101d9696aa7c82d79a0227e4f572d9ab18614b3f58a822300867c351f67be7f164d3", 0xe1}], 0x8, &(0x7f0000001b80)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x48}, {0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001c00)="ae9500dca0624bc018badbf8c4b016c1ab3d680ba8d488062a64a7b78d5542a2ae6ca8f241a03a0c9ca8ead4aa8ecf8645f789021030175769b419eee08e0ed578f66cbdb7da7ce92a98604ee2d91a4e9b628a7dd153d42496dd3169f3ac3b41c2ea518f06b06305f767ab46b4a79678d74695e30d26a2b4e4d553ddf5ebde5a3ae06647cd1cdbe5eedb98210683338beb4853b1ef9f1197313824113c1f4335983343c42b908709dfab3326f6c53aa642e4742b9a69478fcf4ab21b231552bb0255", 0xc2}, {&(0x7f0000001d00)="a65b790c30f8f06b695f2d78379070a697b924f43f849d0019e6e53c6e1f50a8323c6f4cfffd289222a2cf96504210e60a70c0fe558c5df5130fcb2acf3bef18c4334ddce50006ccecd7e2411463786d4a4ab9b8555708f64a233b4b001e0d1fd851a3a4397516a369177bf3a941b9731735fca9b28397b3272036e7602f061dca6cfb592496e9807fbefb08f765", 0x8e}, {&(0x7f0000001dc0)="1cfc9001d0a9222ea3a50001dbd070775e107a05577e84d3b0e4e4", 0x1b}, {&(0x7f0000001e00)="302b0325dcffbb4e6ff99c4b5e61f3a7e76fac0f755ebf5c21d0c52184c35266550cc47156f744e97d32a003bd8588ba96c26fc2714e0199fb00fbf17e76d22f7daf71a7dfa679822a06f0fbc28058", 0x4f}], 0x4, &(0x7f0000001ec0), 0x0, 0x4040010}, {0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f0000001f00)="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", 0x1000}, {&(0x7f0000002f00)="436badb1459e70f2a403c20b86f1f43d9036cc2789a3e76517c58d6d55d472a7198377384d290721241805a0215354b690dfe8426c250032de47c6841efd9cf439eaf32927b363ce27aec3e17b821226fd46a6a499ba40ea04cfedf042b252b38af6a855b40426bcb3fed177b14f62f27165ebb0b2763466acb59caf3955397c07d431545f23c16fc587a0128306422a86be932af4165cb3310eda7ccc0b7a2e7680fa75fae1d9da5b3c60ad9026ec9900e45d73464a70fbee", 0xb9}], 0x2, &(0x7f0000003000)=[@iv={0x1018, 0x117, 0x2, 0x1000, "6e2b4d84166edb8a77174b167853cfb7a67b407d7427adba5c59af78cf577cd9a7944bfa605b20c61b20d18a2a7de00d08ed3962c3eea1ff0f9f0838feeafe1da5f94b09b50eecc4c5e5dd22dd8248b776a1e1a9f7c5e216988b6f7ff80f980bc162cabfcd66b5840b50b11d8a1b92db2785bdefd96685c1e59e6adbcd11a84ffbfa1541366e4a710bd303540a48a5df5ecfd1f6c5e82b26e12c6cfe41e96f85488de0b727d0dc99b51bba97f7157befa0f2cfe1ce5126276b383da83a43ff4fc1a752d5b28d0c42ce89922b85a667a05043e6a26ca5f0c471ccd78c9ba1eaba454284d240417ce3534bc50c72ab5652d37e08b72126abd367e404d154338c422f045870009c8339145023a0055d3f483fd70c3e8f0c0fc502aee990e4f31a72a7beb8d81d5772232bcbf40eb63f8b3b83146cf4fad95b973ebf897aa4c9df524334bd2024d3aa5bf5be5e51d449f899a3d59157d5df03baecbaa3944c5c73143e24fd1cf9011d7f41555c21f88d1270e18afd9d9512ff55fe07cc53f099d545fc413e4b16ce4171afb9429721768581935ee58bc2559ba45372f7144de4aa6699a23b7ea80b879b1985302f0ac8db63c2d8c3acdeb173c3fecce047044deaed96ba7646191c7a2d498f5142495b96540551863a171fb30d75add059afa4a404948a2ed9cb94595393987a9a6e1723fce043892b77d9fbbcce581ab3fdb45da9055d75b00cd62ad2901ae3d5490683ef35a0694421b213b7a0c106bf503eb279c547ab3e93ef2fd034c83689a368f95c9d2e7d4b03126ecfd75dd9ce8a824b056af9956669f4bb357299fbe92735f0cbec44181a936b1e1b57e4be21829fdd66c4f159a7c6b1697bd138d01be71c131a907ea17244a7bb79d8f0cd2c787567ba042d855ef9b5d81a76cf92f6d0d0a7dd3236a30239b8ce5111b8f241821f932b7adf689a9aae1961893194d496969c20087a4b32438a211f268805283fa2d49cc68d98911394367f14b0ea6a639729127353a94fac9fde60ccb46b1e54f1ab924e1b93bda86291bee07802dba1548403d36581f3c2f6bb3a7fff97bc84dd9c6c89c0fab0fb5472b1d888ef12c978a3fe9bd53e440233fd960bcdc21e194856449687761cd12ef5e14032ec8b66b8de03bcacea18e383b3a19d0b54d22a8d233f9f2101bd8c7ff6c11a9d694c79e1d51e8472b1b78d15c8221a766b501db4781fd044b419b616a4336b7a85c47fc2e81d3dd130e9b3d5766c29bbc9b50f018fbbd94857bfcab7cbe745cdff846b03b0eace71218037554d17d9ff4937c0af22ea12ef57c8d5e313c40f6f09c68a7bb837000b363e7a9e68061b2dc5e1310aaadb44069745336009627583aafeb55112b627c32b2ea312ea3486e003da0438dc2653b19ebf1eee118d190f4c8c95da723ef034a655124407e530d88c50c04bbb1da50fe429ff4992d4c0b02fa1855f415f454d6dd9616f18717eb8d0f45fb36639b8121b58617d6147265c100c79b09c5c961cc28e3b853b6b8f118b9b300bbc738eeb85b5ac3cd6463a18a6c2e94e890382284d7896883cc51a35516700d78adb7bfa23be8db8e7593dfe4cb557a0a3adc03988d5ccc9ce44f4713ad502323bae65e90fc3d8e3a5aa3560446c1e085d2ce956945bd13886a3441e9b8907b6091ae464d88b75f38bbfb1d5e8716cb07b0e2e2a09ea33f4fe6ba8ce918c6668e27d2859b3fcefe4193a3eec48acfe44243a5ae578dcedefdae25343af22731c0b17e3ac2125e37c2d600319d7d4abab150f5cf7b4d778ec3f22450b50ceab2905ed1d58cf41032ca59116c5ad23e65c6cc398f14128b32169b95dc6d86e4359fc08ecddde806d98ee2c216823338b88c5d98d6261c8f73fdd2dfb917b65fd2442eb7729da6af1cc441be391ec2df0b40e90d90fdf48ac67775646d1d42aa086bb13c47dd948cc0939144d09471adfa3d525b0ba3e25f18b4ef327001c65fdade53a3536555a03c2ab0e77e0fda18de135f85a4f01f2468c8442b689326ef94148fc4eea1421dac8faa140ae6a156adcd58e8d951b65a03e16a5351c250526e4d04b53e244c001d7276ae52e92104e4e861f4e584366d1655143f607a258ae8dfffe83b2a54293b8d61faf52c71b262407da88042d597a3193075f4d509884cd9528feb4bf89bb8cb04f924fd2db4a646006f8539649df6c33c1bedba6de2d9137b1c92f367589bd83de3c07c48dc0560f23cb170c829358cc750d2542276b67ae188b2b2280b608ccf63d481d11407062331f1d7fecaef8b275f370e1ad78abd2b49fbe38de913f3c37067572598ae2e6006131563bb8e47ab7cd1efea6cd46dd8e38cb129fa352d27550380c95169a097b56f7c591e03e2d3a20037c2eac4a55c4e4e005ad2f1dd2be5a5c4c1bbd8344ca259b62aaa9178d14d692156becf4b75088b053a81d889853a381d17ca6ca929085dcb81089cf1c1bdc200495428afceb095d1c1b4a771086a33a74c0610cbae954170d767b1a5b1a3e4bdcced1303feb3f6090a24d05f044dc48bfbd48ffdcc452089ef27dbaf7591d23db38442ce1885fab50862ef8a772ae0688a42352cb9297420c2364639fd721ec2a38aacc6df2d0ed3cf0ffc0b8cf8ee4faedd381760b0f3f039a6df62b12018d16c93a455d808bef5e82195489c83aa094c709e56f6aa5e1e6ebfffbf899fddfe4b6b386ead2de3fb1c4d3a7119c20f052892f931f6af099940adf8080ce06cc9e0aba598680a53161b75e245a11cb0d306ce2bada2fd3c328b215a67419902f87eda278970948ffe42fb4e32bdb1e1dacf50fc21a680bc7d645336c7bbf54bfe7cf298b04c7c7db36bbd234de94fcdac192767883573a0a5062a8cebac610d5a86d01a90908d36838e83f76bb9cc8a96046aba7bfcc815ac630e163ab2661024ee5a2184b30a696c8a0caa525dd88af342a87ca4c30e1a31222eb803b9d79505f363223504f443c859fdc3b834f29e907515cb2a7f6f7fd46b72192c8171ddf7c7ebb68a975bfcec9bf261e45bd61d469602d9a4b56d422383eef4c1647a4e17fc2584196399adc576fa883da35a0c26da50cc3aab5eaeac2451c9f1c1ec16218bdf1deacaa96121a4a13ab76bd1624ddde7a1d8ca69e241e10af10994e81acbaa918b56f7aed0ba2baf151dd7b8e028912cf8878f83a9f3a9c132e9bf9f91cc47a3bec5152341d67799706e1cbf86055fe6a32075bbe8c6c17faff6eff9778086edccc3c673740b880807a8d15225df166f146742ea43613e2ffcc8b912fdd144d3b63f7487dd503e4b979b74fa8337ef4b034a9d10c5ea75270e6c001fe8c4477b484b5558dfdbf5c99fb06ded8ee10c042ec0ca56651b301ba3855c19b05b7d9829c9ee65787a094bd12d7a55fdc9dc57e982dfc7e5ec1477a1e7762e13d0cad8d0f23ab0124a8673697bec44e2c86a21424d32d7ba600bcd3485afb22cafa177179b57aa327dac105d46fab03bb50eb3f68e9bbea9aad87403ebe784b2dee1724d79d1895fda7376539d8d4ee1574c48e8820145cd3f7a2b5eaeadb5a73b83d99b95b5637ec630e4424cabbe94ba6f30d5a5742ecc82846f917d4e897966a0f57f1b3ac8c2043cb3b54103a0dc8e5eb29b7fb102a5ff2ce26f4931d44a94a93de884fbc2e8866c7c62ba7aaafdbd3230f56cb020f531a375034390b0e9003a780b4fc70ac431a79864f7abddcbf1ebbf038dbf060de60672b54c117b4815c11694cf4e00e9f3af27775d51e6afb4c638041681f411db881f7693939a7adc23fdec9c8d39347ff8bec9ffb001216679477d93f044f144794e771353814ae63b8c5657317690046dcf7569883e52a1c57ca1970ad78eadffb54ceec8c8b803a0c54e9dda98ab459d4a586fc1f4db48e1bb26f2d713ace3b97847b817cb56dd7cd0525c1baf0b343a0258f208b9ec718c400436f4641fa3180ae61438c1e010997d2b905ed5407133bf270d5eb0c7575e52de39751d1aa30f3dbd5a392e6c871fda19832e81bcc19e42004702220cebc1a1c57808a5b682579f66125a1c773560e0f61a9002076cdb23d3200316c648e6dda870fbafd195a1579f54e1235e52efb872d9f1331185ee0e2b969e474a5e74d58de7a9917228239be030704fc7f4888c67889e5f5450171fbafb8e16c25a27274879ad5323a996f72ada1f98c568d1c192d2ecd020e70e190ee500d26246ea6a4d10ada691d0201144d1833899d039ef36800c735187e9d0e2c734c692845b8a481e65b084cfbd4f21de8de5c5a621b2bd51b2f96e336712f423fd0a83b10ecf1d9533d61f06f16e9808b425698df8a3eb6bd126d1bbb37551d0c46486fed49ffbb75f088028f547ab0e92019fa8c99bccafb2d4e79e2952db3a991a85b8c0085c1ac8ebc126fcfce0ae0ca95d90b55d477adb876bf776a9ec11d0eed6d67646967a396c848bdc6ca121a98c8d774e65e8d349cdb40e4966a892f5cda1ad057b3823dc97223e785d575d6ae8ebf39c5d6a79aa8217dea486566adb7e0cfa258de927b99390f7c51a634bbc7726fcd222671f847194db420beed6a7db9ab127e54f51d8eac62759c355205058e8236d7f299b2187aa30f7977ea6b822fd50084df5c8841e4ed9a760647651af92b6824816d5579a307d7e873ee1dfbf4c4eed9f46ada6a44de771de3647b537e0cf3d55165f0bd3da8cd676c8104706d72f0a9a3ae6335fc4d170f0541aa98c6827b4133dd6500a4e2d634da77d036d5a7163e08ea3c36fb89106611af305fff80289226477c9d41ffb3945eef967e92ae9e0b9844bdeeb2a83f25cbe14e3c10f705391d6e54f89ddc84af379ffe270d3dbca1c9f6df06470b34bf6c0d1c16244c1871efe56b59968c0707894598f77d4ad9551c5731f61147f7e0aa8a07742a36ddb2ba88929c1006c2ba83a666282b01dda8aa362bf56074622d150dffa062e7a799abf3084ea70a4357559f367aaa75d08eb56d32c93afcddcd7d7eee6701785dc6fd69427d86e55e9525be29d2409b9ddcac1c4387b43c77499614e7aa5282e008072338dc78b4bf080c3472a178ecb298a75c405ada3fa9e2b484b58d0d7110e412a376984e7aea253c798d13c00c3a20c319396d4c9fb6c952c3552d9037c34214241ad31931fb3fa8507fd99a0f6c1a6b7984de8eb1169c14ea31ec177138dcc156562b0a6ee09543d72896abfe4004f5935fddfa2c30fe5f20c017229ad6796cc5232d7f29a16173159ec472b04c9e339c73276b055bd6126a102ed088a0aecdca0fa8b689b195a2c799f4e2929a46195d1e5be5cdcd8ccd9e3f2fffa0e73c35ded30735440accb74569dabb333e5a1ce8bd7b728e9018cd2c4dc539e43ba63650155446244543332a36ce36a4d13c5979037b8d033705cae0859c420dbec44da4635cd5695c36360191a156640035fd25b1e43fee51f45a12390124afc4a4315974bafde9b920cc1f07e5630ef5f0409ae55a86e8f1f06da193873f2830bc8e1893dc74248829b770be4af17f11b7acee8e5eb1914fdfa424a4fee58ee5be7f5c36c2865b18821e195a9f5f071bdc8b258b5378217ee6d6ee70ee19263f73e25a9303bfd1610a762f5795be38d8df64a9fb1eb78f90b210a3749e449a4272e6af39b4271f9abac5a8e8a2dc6e9438f28ab9c251f6af7c77f003aaebe7cbb8b56e55bc37697c042bcbc54d6cbc42b13214e51a126a0476d9d35c8d26d4a52e3f884154087a951a5d6623ca10133958fd6847279b3e05efce3b9f600514568bc4eb1514"}, @assoc={0x18, 0x117, 0x4, 0x9}, @iv={0xc8, 0x117, 0x2, 0xb1, "9d1fb568fb7999c3d03797724336a1f488fdfdab29067459ee8246a694918ce477f53e7a116322afb7dab7369fbb86095ec0d5f35a82186c40e57e16ae9674d423dd05dcd8d2a04818eb6d1e3e9e1b10ccd28718dbe4cb0713709a5b1316c51deb97268c1abfb61102303dcc07d4a668106feb2e8001bedace6247ba5f640230fa5447038d1bc7e0a3769ab4cdcb5ce8cd827bed037e7d1550b3cf3903907d0faeb1b4adec6a8dc7663dbbafa4f795ff14"}, @assoc={0x18, 0x117, 0x4, 0x81}], 0x1110, 0x4010}], 0x4, 0x40040) sendmsg$kcm(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r8, 0x29, 0x10, &(0x7f0000faf000), 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 2033/05/18 03:33:53 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x80000000000004) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="188d860000000000f7496675c50000000000000000001143a702aee0eca06546e22bf7474cf9707499fff96090d36b2c14566785fee08b438ad4d2693e419fc38ddbeaaec07643f0d765ecea9058322c994ec462858a39cabe61b140909797b298353aed536e2f987321774d4986081882af3d5885a585c263891e9796a4303457345fad0994baf7d70f3947c50144452f8c8b43111317add2a9116e5fd9c8d5e95af7555361d20c79f1be23b02fc380d24d3de08b4d81f434b0d422500f86583f14356020ba1ba624cf4519753702d6ec07"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:53 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 259.880138] device lo left promiscuous mode 2033/05/18 03:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 2: perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f0000000540)={&(0x7f0000000500)}, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)}}, &(0x7f0000000680)=0x18) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write(r1, &(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) r3 = open(&(0x7f00000009c0)='./file0\x00', 0x410400, 0x126) getsockname$inet6(r3, &(0x7f0000000a00)={0x0, 0x0, 0x0, @local}, &(0x7f0000000a40)=0x1c) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000380)={0x4, r1}) sendmsg$netlink(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}, 0x80) setsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f00000003c0)=0x4, 0x4) fchown(r1, r2, r4) getresgid(&(0x7f0000000840), &(0x7f00000006c0), &(0x7f0000000400)) fstat(r1, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000880)={0x0, @in6={{0xa, 0x4e24, 0x4, @local={0xfe, 0x80, [], 0xaa}, 0x8}}, 0x0, 0x2b, 0x16, 0x8, 0xc0}, &(0x7f0000000480)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f00000004c0)={r6, 0x200, 0x1, 0x1f}, 0x10) lstat(&(0x7f0000008940)='./file0\x00', &(0x7f0000008980)) write$cgroup_int(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="efb248e301c3c9d306000000a8c85524030000008561ef419964e2bd4948dcd0de5700000000000000d292a25945800b02000000000000004311b9213907570e2f9ef843d2245da2670112137e8d946c3c0576c2c760919e1b3b3ed2905c60d07ed9536651db4f00422841f4d9d556fb00b990af72a8259e27c7b8a7ec9c8838f70656f41360f3d1cb36e1d4060b258f6f14bb9c61"], 0x93) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000cc0)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000f40)}], 0x1, &(0x7f0000001580)}], 0x1, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000007c0), &(0x7f0000000800)) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000940)) r7 = syz_open_dev$amidi(&(0x7f00000005c0)='/dev/amidi#\x00', 0x8, 0x200000) getpgrp(0x0) syz_open_dev$loop(&(0x7f0000000b80)='/dev/loop#\x00', 0x0, 0x4006) r8 = memfd_create(&(0x7f0000000000)="74086e750000000000000000008c00", 0x0) socket$vsock_stream(0x28, 0x1, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000780)={0x0, 0x65d, 0x81, 0x4}, &(0x7f0000000800)=0x10) dup2(r7, r8) write$cgroup_pid(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="39c3cc555934b2008502da331f68ba842f865efe41d53ed560f69d12ce2d7c2227256fb0d22e027844a91d5764ac68aadf1a1f4c2ef74fa041e5e4691769d7d34803c7c29c2ad1530e6b1ce1bebbda4128a7850502a59e38af32d518056588d720de8e4afef3a562ff1c5e5d2fe00eb7ad50f349cdbd2a4087d469ae139120c582f0183afec70ce4a9207edf97d58b47515fa4f7891d4ad413e543b0dcb45df2461278cb7053fd1b0e28d043bdab56b6d08ae943cf83f9094fad0c9e4db69eaf125716d164e254aa93d6e2b156aac67a4892d01790a42bde3cb9bc936ae29db3e5e4c06fd3fcd87b0f99d3f32b996740685edf668aec"], 0x5) [ 259.933806] device lo left promiscuous mode [ 259.984968] device lo entered promiscuous mode 2033/05/18 03:33:53 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 260.028766] device lo entered promiscuous mode 2033/05/18 03:33:53 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:53 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x0, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000500)) [ 260.099856] device lo left promiscuous mode [ 260.173900] device lo left promiscuous mode [ 260.201792] device lo entered promiscuous mode [ 260.241456] device lo entered promiscuous mode 2033/05/18 03:33:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000059ffc), 0x1) socket$nl_crypto(0x10, 0x3, 0x15) 2033/05/18 03:33:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000001c0)) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:54 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x0, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockname(r0, &(0x7f0000000280)=@can, &(0x7f00000001c0)=0x80) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:54 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 2: r0 = socket(0x4, 0x5, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) getpeername$packet(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000800)=0x14) sendto$packet(r0, &(0x7f0000000100)="39550d6263fd395de7106b1767cfe8d7d4b754e86af78cb1744a12c0ae4aac863ad08a83957722b5847ef105cd66b7a4616952e2963fafac55cbb896f4f800b89519495f2117f8734865b2ab2f6fc8a685a98327e4839b65144b69d08f2246b466ed2c0657576104ec44336d248f68df067a45aca254478dc0b1c67a91ef4249", 0x80, 0x40, &(0x7f0000000840)={0x11, 0x16, r2, 0x1, 0x3f, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xd}}, 0x14) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ioctl$sock_netdev_private(r0, 0x89fa, &(0x7f0000000440)="ac25760bd00c56dc109c280d1b73df4acbf78b830a34c082eba2f2840db381ac3f6b099f42cf8d8ffada13805c68e501fbe256e4a213390b25499576556807e641466800455d53699b7307a5c046a933320d82c77cc2d16d3a613c0f31816b423914b3f162c0deb5b05a4cd7d88cb2cabc2d0c9868fde1fee065240086cec430914d3b67d0819461034a27e6b50c985e152742914e7d72c187a225be5252ca7f0681ecd345454cfbfb4c3380a23bd752c45457bebe96fc488f384864846133fe467ca1cbf272baddecd531975dabecb5036d02c9b1bd344b75896a2eac170af01ac2ddd8c9378ad04b3b6d8138515e311661fe7e8f2f") process_vm_readv(r3, &(0x7f0000000200)=[{&(0x7f0000000180)=""/101, 0x65}], 0x1, &(0x7f0000000400)=[{&(0x7f0000000240)=""/181, 0xb5}, {&(0x7f0000000300)=""/199, 0xc7}], 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) io_submit(r1, 0x1, &(0x7f0000000a80)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)="8b", 0x1}]) exit(0xe7fd) 2033/05/18 03:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 260.328875] device lo left promiscuous mode 2033/05/18 03:33:54 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x0, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x0, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000500)) [ 260.367185] device lo entered promiscuous mode 2033/05/18 03:33:54 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 260.408265] device lo left promiscuous mode 2033/05/18 03:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 260.442709] device lo entered promiscuous mode [ 260.490985] device lo left promiscuous mode [ 260.505755] device lo entered promiscuous mode [ 260.540710] device lo left promiscuous mode [ 260.557456] device lo entered promiscuous mode 2033/05/18 03:33:54 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x0, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 3 (fault-call:13 fault-nth:0): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000200)) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000080)) shmget$private(0x0, 0x1000, 0x1800, &(0x7f0000ffe000/0x1000)=nil) sendto$inet(r0, &(0x7f0000000500)="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", 0xfffffdea, 0x8001, &(0x7f0000000000)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0xa2) r1 = shmget(0x0, 0x1000, 0x78000028, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_INFO(r1, 0xe, &(0x7f00000001c0)=""/15) 2033/05/18 03:33:54 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x0, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000280)={&(0x7f0000ffc000/0x1000)=nil, 0xff, 0x2, 0x40, &(0x7f0000bff000/0x400000)=nil, 0x3}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000020"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000400300000000000000000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 260.750688] FAULT_INJECTION: forcing a failure. [ 260.750688] name failslab, interval 1, probability 0, space 0, times 0 [ 260.762184] CPU: 0 PID: 32051 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 260.769367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.778724] Call Trace: [ 260.781323] dump_stack+0x194/0x24d [ 260.784961] ? arch_local_irq_restore+0x53/0x53 [ 260.789654] should_fail+0x8c0/0xa40 [ 260.793371] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.798471] ? lock_downgrade+0x980/0x980 [ 260.802613] ? get_pid_task+0xbc/0x140 [ 260.806497] ? proc_fail_nth_write+0x9b/0x1d0 [ 260.811070] ? map_files_get_link+0x3a0/0x3a0 [ 260.815569] ? find_held_lock+0x35/0x1d0 [ 260.819694] ? check_same_owner+0x320/0x320 [ 260.824008] ? __lock_is_held+0xb6/0x140 [ 260.828072] ? rcu_note_context_switch+0x710/0x710 [ 260.833020] should_failslab+0xec/0x120 [ 260.836989] __kmalloc_track_caller+0x5f/0x760 [ 260.841570] ? strncpy_from_user+0x430/0x430 [ 260.845967] ? strndup_user+0x62/0xb0 [ 260.849773] memdup_user+0x2c/0x90 [ 260.853320] strndup_user+0x62/0xb0 [ 260.856944] SyS_mount+0x3c/0x120 [ 260.860396] ? copy_mnt_ns+0xb30/0xb30 [ 260.864280] do_syscall_64+0x281/0x940 [ 260.868163] ? __do_page_fault+0xc90/0xc90 [ 260.872388] ? _raw_spin_unlock_irq+0x27/0x70 [ 260.876874] ? finish_task_switch+0x1c1/0x7e0 [ 260.881364] ? syscall_return_slowpath+0x550/0x550 [ 260.886286] ? syscall_return_slowpath+0x2ac/0x550 [ 260.891212] ? prepare_exit_to_usermode+0x350/0x350 [ 260.896225] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 260.901596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.906445] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.912059] RIP: 0033:0x4548b9 [ 260.915235] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 260.922932] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 260.930188] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 260.937446] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 260.944702] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2033/05/18 03:33:54 executing program 2: pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)={0xaa}) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) dup2(r1, r0) ioctl$FIONREAD(r1, 0x541b, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x4000)=nil, 0x4000}, 0x3}) dup2(r0, r2) 2033/05/18 03:33:54 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x0, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:54 executing program 3 (fault-call:13 fault-nth:1): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 260.951968] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 [ 260.977129] device lo left promiscuous mode 2033/05/18 03:33:54 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x0, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 261.005297] device lo entered promiscuous mode [ 261.049526] device lo left promiscuous mode [ 261.051326] FAULT_INJECTION: forcing a failure. [ 261.051326] name failslab, interval 1, probability 0, space 0, times 0 [ 261.065273] CPU: 1 PID: 32070 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 261.072461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.081825] Call Trace: [ 261.084422] dump_stack+0x194/0x24d [ 261.087220] device lo entered promiscuous mode [ 261.088147] ? arch_local_irq_restore+0x53/0x53 [ 261.088162] ? __save_stack_trace+0x7e/0xd0 [ 261.088195] should_fail+0x8c0/0xa40 [ 261.088217] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.110641] ? kasan_kmalloc+0xad/0xe0 [ 261.114531] ? __kmalloc_track_caller+0x15e/0x760 [ 261.119375] ? memdup_user+0x2c/0x90 [ 261.123085] ? strndup_user+0x62/0xb0 [ 261.126887] ? SyS_mount+0x3c/0x120 [ 261.130519] ? proc_fail_nth_write+0x9b/0x1d0 [ 261.135025] ? map_files_get_link+0x3a0/0x3a0 [ 261.139536] ? find_held_lock+0x35/0x1d0 [ 261.143649] ? check_same_owner+0x320/0x320 [ 261.147980] ? rcu_note_context_switch+0x710/0x710 [ 261.153008] ? __check_object_size+0x8b/0x530 [ 261.157521] should_failslab+0xec/0x120 [ 261.161769] __kmalloc_track_caller+0x5f/0x760 [ 261.166456] ? strncpy_from_user+0x430/0x430 [ 261.170871] ? strndup_user+0x62/0xb0 [ 261.174670] ? _copy_from_user+0x99/0x110 [ 261.178821] memdup_user+0x2c/0x90 [ 261.182360] strndup_user+0x62/0xb0 [ 261.185992] SyS_mount+0x6b/0x120 [ 261.189453] ? copy_mnt_ns+0xb30/0xb30 [ 261.193336] do_syscall_64+0x281/0x940 [ 261.197216] ? __do_page_fault+0xc90/0xc90 [ 261.201446] ? finish_task_switch+0x1c1/0x7e0 [ 261.205943] ? syscall_return_slowpath+0x550/0x550 [ 261.210869] ? syscall_return_slowpath+0x2ac/0x550 [ 261.215804] ? prepare_exit_to_usermode+0x350/0x350 [ 261.220826] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 261.226203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.231070] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.236250] RIP: 0033:0x4548b9 [ 261.239428] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.247130] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 261.254479] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 261.261742] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 261.269027] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 261.276288] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 261.283953] device lo left promiscuous mode 2033/05/18 03:33:55 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x0, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x200000032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) close(r2) r3 = memfd_create(&(0x7f0000a98000)='y#\x00W', 0x0) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) write(r2, &(0x7f000014d000), 0x0) userfaultfd(0x800) close(r0) 2033/05/18 03:33:55 executing program 3 (fault-call:13 fault-nth:2): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x0, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) r3 = syz_open_dev$amidi(&(0x7f00000018c0)='/dev/amidi#\x00', 0x4, 0x0) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000001900)={'ip6gre0\x00', 0xffff}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:55 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000950000b600000100837be85e37e4dc5ea0b78c85ef1fb1704257360b7e8aa48dfdf3ed416744c1084fbf874eefbe24b2be0b38cc2bbafd"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000001c0)) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:55 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 261.314634] device lo entered promiscuous mode [ 261.323276] device lo left promiscuous mode [ 261.346871] device lo entered promiscuous mode [ 261.404360] FAULT_INJECTION: forcing a failure. [ 261.404360] name failslab, interval 1, probability 0, space 0, times 0 [ 261.415724] CPU: 0 PID: 32094 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 261.422913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.432281] Call Trace: [ 261.434887] dump_stack+0x194/0x24d [ 261.438542] ? arch_local_irq_restore+0x53/0x53 [ 261.443217] ? find_held_lock+0x35/0x1d0 [ 261.447307] should_fail+0x8c0/0xa40 [ 261.451036] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.456160] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 261.461621] ? rcutorture_record_progress+0x10/0x10 [ 261.466646] ? find_held_lock+0x35/0x1d0 [ 261.470760] ? check_same_owner+0x320/0x320 [ 261.475085] ? rcu_note_context_switch+0x710/0x710 [ 261.480014] ? save_stack+0xa3/0xd0 [ 261.483655] should_failslab+0xec/0x120 [ 261.487637] kmem_cache_alloc+0x47/0x760 [ 261.491711] ? map_files_get_link+0x3a0/0x3a0 [ 261.496227] getname_flags+0xcb/0x580 [ 261.500041] user_path_at_empty+0x2d/0x50 [ 261.504175] do_mount+0x15f/0x2bb0 [ 261.507976] ? __might_fault+0x110/0x1d0 [ 261.512023] ? lock_downgrade+0x980/0x980 [ 261.516156] ? copy_mount_string+0x40/0x40 [ 261.520373] ? check_same_owner+0x320/0x320 [ 261.524673] ? __check_object_size+0x8b/0x530 [ 261.529156] ? __might_sleep+0x95/0x190 [ 261.533127] ? kasan_check_write+0x14/0x20 [ 261.537350] ? _copy_from_user+0x99/0x110 [ 261.541507] ? memdup_user+0x5e/0x90 [ 261.545200] ? copy_mount_options+0x1f7/0x2e0 [ 261.549679] SyS_mount+0xab/0x120 [ 261.553112] ? copy_mnt_ns+0xb30/0xb30 [ 261.556983] do_syscall_64+0x281/0x940 [ 261.560856] ? __do_page_fault+0xc90/0xc90 [ 261.565076] ? _raw_spin_unlock_irq+0x27/0x70 [ 261.569555] ? finish_task_switch+0x1c1/0x7e0 [ 261.574035] ? syscall_return_slowpath+0x550/0x550 [ 261.578948] ? syscall_return_slowpath+0x2ac/0x550 [ 261.583859] ? prepare_exit_to_usermode+0x350/0x350 [ 261.588856] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 261.594205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.599037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.604221] RIP: 0033:0x4548b9 [ 261.607395] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.615081] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 261.622326] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 261.629573] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 261.636833] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 261.644078] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2033/05/18 03:33:55 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x0, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:55 executing program 3 (fault-call:13 fault-nth:3): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 261.659362] device lo left promiscuous mode [ 261.671534] device lo left promiscuous mode [ 261.682386] device lo entered promiscuous mode [ 261.703512] device lo entered promiscuous mode 2033/05/18 03:33:55 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x0, 0x88100) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x7, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000240)=&(0x7f0000000200)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000300)={0xaa}) r3 = creat(&(0x7f00000007c0)='./control\x00', 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) listen$netrom(0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000280)={0x0, 0x2, 0x8, 0x80000001}, &(0x7f00000002c0)=0x10) clock_gettime(0x0, &(0x7f0000000740)) write$sndseq(r0, &(0x7f0000011fd2), 0x0) mount(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00', &(0x7f0000000100)='xfs\x00', 0x21000, &(0x7f00000001c0)) unlink(&(0x7f00000000c0)='./control/file0\x00') rt_sigprocmask(0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x8) rmdir(&(0x7f000015dff6)='./control\x00') splice(r0, &(0x7f0000000600), r1, &(0x7f0000000640), 0x0, 0xa) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') r4 = fcntl$getown(r2, 0x9) timer_create(0x5, &(0x7f0000000840)={0x0, 0x1d, 0x0, @thr={&(0x7f0000000440), &(0x7f0000000800)}}, &(0x7f0000000880)=0x0) timer_gettime(r5, &(0x7f00000008c0)) sched_getattr(r4, &(0x7f0000000540), 0x30, 0x0) close(r1) openat(r2, &(0x7f0000000140)='./control/file0\x00', 0x0, 0x80) [ 261.722407] device lo left promiscuous mode [ 261.753128] device lo left promiscuous mode [ 261.753638] FAULT_INJECTION: forcing a failure. [ 261.753638] name failslab, interval 1, probability 0, space 0, times 0 [ 261.763506] device lo entered promiscuous mode [ 261.768922] CPU: 1 PID: 32122 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 261.780649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.789986] Call Trace: [ 261.792563] dump_stack+0x194/0x24d [ 261.796178] ? arch_local_irq_restore+0x53/0x53 [ 261.800832] ? lock_downgrade+0x980/0x980 [ 261.804971] should_fail+0x8c0/0xa40 [ 261.808665] ? trace_hardirqs_off+0x10/0x10 [ 261.812980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.818064] ? rcutorture_record_progress+0x10/0x10 [ 261.823070] ? is_bpf_text_address+0xa4/0x120 [ 261.827548] ? kernel_text_address+0x102/0x140 [ 261.832115] ? find_held_lock+0x35/0x1d0 [ 261.836198] ? check_same_owner+0x320/0x320 [ 261.840585] ? putname+0xee/0x130 [ 261.844045] ? filename_lookup+0x315/0x500 [ 261.848293] ? user_path_at_empty+0x40/0x50 [ 261.852598] ? rcu_note_context_switch+0x710/0x710 [ 261.857506] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.862861] should_failslab+0xec/0x120 [ 261.866816] kmem_cache_alloc+0x47/0x760 [ 261.870860] ? perf_trace_lock_acquire+0xe3/0x980 [ 261.875856] ? free_obj_work+0x690/0x690 [ 261.879903] alloc_vfsmnt+0xe0/0x9c0 [ 261.883597] ? path_lookupat+0x238/0xba0 [ 261.887644] ? mnt_free_id.isra.21+0x50/0x50 [ 261.892040] ? trace_hardirqs_off+0x10/0x10 [ 261.896345] ? putname+0xee/0x130 [ 261.899796] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.904797] ? find_held_lock+0x35/0x1d0 [ 261.908848] ? __get_fs_type+0x8a/0xc0 [ 261.912831] ? lock_downgrade+0x980/0x980 [ 261.916958] ? module_unload_free+0x5b0/0x5b0 [ 261.921430] ? lock_release+0xa40/0xa40 [ 261.925414] ? mpi_resize+0x200/0x200 [ 261.929223] vfs_kern_mount.part.26+0x84/0x4a0 [ 261.933790] ? may_umount+0xa0/0xa0 [ 261.937411] ? _raw_read_unlock+0x22/0x30 [ 261.941537] ? __get_fs_type+0x8a/0xc0 [ 261.945418] do_mount+0xea4/0x2bb0 [ 261.948933] ? __might_fault+0x110/0x1d0 [ 261.953011] ? copy_mount_string+0x40/0x40 [ 261.957231] ? __check_object_size+0x8b/0x530 [ 261.961721] ? __might_sleep+0x95/0x190 [ 261.965687] ? kasan_check_write+0x14/0x20 [ 261.969901] ? _copy_from_user+0x99/0x110 [ 261.974033] ? memdup_user+0x5e/0x90 [ 261.977734] ? copy_mount_options+0x1f7/0x2e0 [ 261.982215] SyS_mount+0xab/0x120 [ 261.985647] ? copy_mnt_ns+0xb30/0xb30 [ 261.989516] do_syscall_64+0x281/0x940 [ 261.993379] ? __do_page_fault+0xc90/0xc90 [ 261.997592] ? _raw_spin_unlock_irq+0x27/0x70 [ 262.002066] ? finish_task_switch+0x1c1/0x7e0 [ 262.006540] ? syscall_return_slowpath+0x550/0x550 [ 262.011449] ? syscall_return_slowpath+0x2ac/0x550 [ 262.016533] ? prepare_exit_to_usermode+0x350/0x350 [ 262.021538] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 262.026887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.031721] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.036889] RIP: 0033:0x4548b9 [ 262.040058] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:33:56 executing program 3 (fault-call:13 fault-nth:4): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x0, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 262.047751] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 262.055000] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 262.062252] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 262.069503] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 262.076749] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 262.136572] device lo entered promiscuous mode 2033/05/18 03:33:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="000000000000009500006668000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x0, 0xffffffffffffffff) 2033/05/18 03:33:56 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 262.267611] device lo left promiscuous mode [ 262.302825] device lo entered promiscuous mode [ 262.337437] FAULT_INJECTION: forcing a failure. [ 262.337437] name failslab, interval 1, probability 0, space 0, times 0 [ 262.348791] CPU: 1 PID: 32144 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 262.355971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.365319] Call Trace: [ 262.367907] dump_stack+0x194/0x24d [ 262.371542] ? arch_local_irq_restore+0x53/0x53 [ 262.376223] ? __kernel_text_address+0xd/0x40 [ 262.380741] should_fail+0x8c0/0xa40 [ 262.385500] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.390601] ? perf_trace_lock_acquire+0xe3/0x980 [ 262.395440] ? save_stack+0xa3/0xd0 [ 262.399067] ? perf_trace_lock+0x900/0x900 [ 262.403287] ? do_mount+0xea4/0x2bb0 [ 262.407173] ? find_held_lock+0x35/0x1d0 [ 262.411250] ? check_same_owner+0x320/0x320 [ 262.415600] ? rcu_note_context_switch+0x710/0x710 [ 262.420560] should_failslab+0xec/0x120 [ 262.424518] __kmalloc_track_caller+0x5f/0x760 [ 262.429175] ? do_raw_spin_trylock+0x190/0x190 [ 262.433735] ? kstrdup_const+0x39/0x50 [ 262.437607] kstrdup+0x39/0x70 [ 262.440785] kstrdup_const+0x39/0x50 [ 262.444499] alloc_vfsmnt+0x1a5/0x9c0 [ 262.448289] ? path_lookupat+0x238/0xba0 [ 262.452331] ? mnt_free_id.isra.21+0x50/0x50 [ 262.456733] ? trace_hardirqs_off+0x10/0x10 [ 262.461045] ? putname+0xee/0x130 [ 262.464582] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.469680] ? find_held_lock+0x35/0x1d0 [ 262.473742] ? __get_fs_type+0x8a/0xc0 [ 262.477614] ? lock_downgrade+0x980/0x980 [ 262.481752] ? module_unload_free+0x5b0/0x5b0 [ 262.486245] ? lock_release+0xa40/0xa40 [ 262.490217] ? mpi_resize+0x200/0x200 [ 262.494017] vfs_kern_mount.part.26+0x84/0x4a0 [ 262.498589] ? may_umount+0xa0/0xa0 [ 262.502214] ? _raw_read_unlock+0x22/0x30 [ 262.506352] ? __get_fs_type+0x8a/0xc0 [ 262.510258] do_mount+0xea4/0x2bb0 [ 262.513776] ? __might_fault+0x110/0x1d0 [ 262.517837] ? copy_mount_string+0x40/0x40 [ 262.522066] ? __check_object_size+0x8b/0x530 [ 262.526570] ? __might_sleep+0x95/0x190 [ 262.530543] ? kasan_check_write+0x14/0x20 [ 262.534766] ? _copy_from_user+0x99/0x110 [ 262.538917] ? memdup_user+0x5e/0x90 [ 262.542630] ? copy_mount_options+0x1f7/0x2e0 [ 262.547115] SyS_mount+0xab/0x120 [ 262.550568] ? copy_mnt_ns+0xb30/0xb30 [ 262.554437] do_syscall_64+0x281/0x940 [ 262.558315] ? __do_page_fault+0xc90/0xc90 [ 262.562536] ? _raw_spin_unlock_irq+0x27/0x70 [ 262.567022] ? finish_task_switch+0x1c1/0x7e0 [ 262.571516] ? syscall_return_slowpath+0x550/0x550 [ 262.576449] ? syscall_return_slowpath+0x2ac/0x550 [ 262.581383] ? prepare_exit_to_usermode+0x350/0x350 [ 262.586395] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 262.591758] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.596602] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.601776] RIP: 0033:0x4548b9 [ 262.604941] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 262.612627] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 262.619874] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 262.627246] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2033/05/18 03:33:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0xfffffffffffffeb3) readv(r0, &(0x7f0000002fe0)=[{&(0x7f0000002f94)=""/108, 0x6c}], 0x1) 2033/05/18 03:33:56 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x10080000040, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000380)={0x1}, 0x4) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000001c0)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x1e) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:56 executing program 3 (fault-call:13 fault-nth:5): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 262.634530] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 262.641781] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 [ 262.651371] device lo left promiscuous mode [ 262.657299] device lo entered promiscuous mode 2033/05/18 03:33:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') r1 = epoll_create(0x1000000000028a) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000001480)) mkdir(&(0x7f000063543e)='./file0\x00', 0x0) mount(&(0x7f00008bcff8)='./file0\x00', &(0x7f0000a51ff8)='./file0\x00', &(0x7f00002d6ffd)='9p\x00', 0x5000, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00007d7ff8)='./file0\x00') 2033/05/18 03:33:56 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 262.731378] device lo left promiscuous mode [ 262.751598] device lo entered promiscuous mode [ 262.755053] FAULT_INJECTION: forcing a failure. [ 262.755053] name failslab, interval 1, probability 0, space 0, times 0 [ 262.767503] CPU: 0 PID: 32165 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 262.774688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.784033] Call Trace: [ 262.786610] dump_stack+0x194/0x24d [ 262.790222] ? arch_local_irq_restore+0x53/0x53 [ 262.794875] ? __kernel_text_address+0xd/0x40 [ 262.799375] should_fail+0x8c0/0xa40 [ 262.803074] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.808160] ? perf_trace_lock_acquire+0xe3/0x980 [ 262.812978] ? save_stack+0xa3/0xd0 [ 262.816592] ? perf_trace_lock+0x900/0x900 [ 262.820812] ? do_mount+0xea4/0x2bb0 [ 262.824511] ? find_held_lock+0x35/0x1d0 [ 262.828581] ? check_same_owner+0x320/0x320 [ 262.832896] ? rcu_note_context_switch+0x710/0x710 [ 262.837814] should_failslab+0xec/0x120 [ 262.841769] __kmalloc_track_caller+0x5f/0x760 [ 262.846336] ? do_raw_spin_trylock+0x190/0x190 [ 262.850893] ? kstrdup_const+0x39/0x50 [ 262.854765] kstrdup+0x39/0x70 [ 262.857944] kstrdup_const+0x39/0x50 [ 262.861635] alloc_vfsmnt+0x1a5/0x9c0 [ 262.865413] ? path_lookupat+0x238/0xba0 [ 262.869465] ? mnt_free_id.isra.21+0x50/0x50 [ 262.873858] ? trace_hardirqs_off+0x10/0x10 [ 262.878164] ? putname+0xee/0x130 [ 262.881610] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.886610] ? find_held_lock+0x35/0x1d0 [ 262.890660] ? __get_fs_type+0x8a/0xc0 [ 262.894526] ? lock_downgrade+0x980/0x980 [ 262.898652] ? module_unload_free+0x5b0/0x5b0 [ 262.903133] ? lock_release+0xa40/0xa40 [ 262.907088] ? mpi_resize+0x200/0x200 [ 262.910878] vfs_kern_mount.part.26+0x84/0x4a0 [ 262.915444] ? may_umount+0xa0/0xa0 [ 262.919049] ? _raw_read_unlock+0x22/0x30 [ 262.923177] ? __get_fs_type+0x8a/0xc0 [ 262.927051] do_mount+0xea4/0x2bb0 [ 262.930571] ? __might_fault+0x110/0x1d0 [ 262.934621] ? copy_mount_string+0x40/0x40 [ 262.938837] ? __check_object_size+0x8b/0x530 [ 262.943320] ? __might_sleep+0x95/0x190 [ 262.947280] ? kasan_check_write+0x14/0x20 [ 262.951491] ? _copy_from_user+0x99/0x110 [ 262.955619] ? memdup_user+0x5e/0x90 [ 262.959336] ? copy_mount_options+0x1f7/0x2e0 [ 262.963814] SyS_mount+0xab/0x120 [ 262.967241] ? copy_mnt_ns+0xb30/0xb30 [ 262.971109] do_syscall_64+0x281/0x940 [ 262.974976] ? __do_page_fault+0xc90/0xc90 [ 262.979193] ? _raw_spin_unlock_irq+0x27/0x70 [ 262.983667] ? finish_task_switch+0x1c1/0x7e0 [ 262.988158] ? syscall_return_slowpath+0x550/0x550 [ 262.993065] ? syscall_return_slowpath+0x2ac/0x550 [ 262.997971] ? prepare_exit_to_usermode+0x350/0x350 [ 263.002964] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 263.008312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.013143] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.018314] RIP: 0033:0x4548b9 [ 263.021481] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 263.029165] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 263.036409] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 263.043655] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2033/05/18 03:33:56 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:56 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 263.051419] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 263.058664] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 263.071656] device lo left promiscuous mode 2033/05/18 03:33:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x0, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 263.096403] device lo entered promiscuous mode 2033/05/18 03:33:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x0, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 263.211556] device lo left promiscuous mode [ 263.250377] device lo entered promiscuous mode 2033/05/18 03:33:57 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 263.301587] device lo left promiscuous mode [ 263.308314] device lo entered promiscuous mode 2033/05/18 03:33:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x0, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 3 (fault-call:13 fault-nth:6): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x0, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) r4 = shmget$private(0x0, 0x1000, 0x801, &(0x7f0000ffe000/0x1000)=nil) shmat(r4, &(0x7f0000ffa000/0x2000)=nil, 0x4000) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000ddffe7ff00001e009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:57 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="160000220014819fc75d8b6f3f31951fb47e7504bb35542ce6402a44e8a6b2ca57bac1f34d267b69eb2b0033ea237bd937886fe7fdef24f08494f5c6e42b8ea8c849b65f1f2d5b08b4b8b1514c1a5eb70bae09339af34f92a7427ed0c5546dae1c2c4834c363ab28e117bdf05fca41e9a37d1368e9e4c8a09d9df25b81b1b70fd45373ff8452464f1373beb2c77270b711709071ef9e9785fd5c787df1d63e4b5fd301940c14fba583a92c6b7a89d483b1ac96caca0d90fe423e726db89fc77e1c9a323fe9133338e465cca4fb7af5cab4a1392782735f"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:33:57 executing program 2: getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00003fd000)=[{&(0x7f0000853000)=""/255, 0xffffff1f}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup3(0xffffffffffffffff, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000006000)) read(r2, &(0x7f0000000200)=""/90, 0xedf40ca8) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) mq_timedsend(r2, &(0x7f0000000640)="77b0d931b49fdca4bf68b463603131a2946f90d066d561efec31ec6da75814e4e8bbe0cb88c034da7f5096722119797611ce591497d8b0815b9a0edfb73d13d1d6037aa4a9eb18e5d0dfb8750e470308b026c273a1cddea5e3b8d4a99b8b77253a24336ed97916ec93d5f6abed9ff5c3b66cc62d936d3c31ac8ec03fa65ed5423041689cad3540715c0167d2ce8615aab2a609d3f3ca8d533cf65422e3f5", 0x9e, 0x1ff, &(0x7f0000000700)={0x0, 0x1c9c380}) r3 = memfd_create(&(0x7f0000f9dffe)="c403", 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000180)=""/102, 0x66}], 0x1) mmap(&(0x7f0000000000/0xaa7000)=nil, 0xaa7000, 0x0, 0x12, r3, 0x0) [ 263.388414] FAULT_INJECTION: forcing a failure. [ 263.388414] name failslab, interval 1, probability 0, space 0, times 0 [ 263.400173] CPU: 1 PID: 32201 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 263.407368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.416745] Call Trace: [ 263.419519] dump_stack+0x194/0x24d [ 263.423157] ? arch_local_irq_restore+0x53/0x53 [ 263.427855] should_fail+0x8c0/0xa40 [ 263.431586] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.436873] ? find_next_zero_bit+0xe3/0x110 [ 263.441305] ? trace_hardirqs_off+0x10/0x10 [ 263.445642] ? __lock_is_held+0xb6/0x140 [ 263.449709] ? find_held_lock+0x35/0x1d0 [ 263.453780] ? __lock_is_held+0xb6/0x140 [ 263.457868] ? check_same_owner+0x320/0x320 [ 263.462190] ? rcu_note_context_switch+0x710/0x710 [ 263.467113] ? rcu_note_context_switch+0x710/0x710 [ 263.472056] should_failslab+0xec/0x120 [ 263.476039] __kmalloc+0x63/0x760 [ 263.479496] ? lockdep_init_map+0x9/0x10 [ 263.483560] ? debug_mutex_init+0x2d/0x60 [ 263.488645] ? __list_lru_init+0xcf/0x750 [ 263.492806] __list_lru_init+0xcf/0x750 [ 263.496801] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 263.502782] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 263.507806] ? __lockdep_init_map+0xe4/0x650 [ 263.512392] ? lockdep_init_map+0x9/0x10 [ 263.516461] sget_userns+0x691/0xe40 [ 263.520178] ? set_anon_super+0x20/0x20 [ 263.524161] ? put_filp+0x90/0x90 [ 263.527615] ? destroy_unused_super.part.6+0xd0/0xd0 [ 263.532709] ? alloc_vfsmnt+0x762/0x9c0 [ 263.536675] ? path_lookupat+0x238/0xba0 [ 263.540739] ? mnt_free_id.isra.21+0x50/0x50 [ 263.545152] ? trace_hardirqs_off+0x10/0x10 [ 263.549477] ? putname+0xee/0x130 [ 263.552932] ? cap_capable+0x1b5/0x230 [ 263.556829] ? security_capable+0x8e/0xc0 [ 263.561072] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 263.566260] ? ns_capable_common+0xcf/0x160 [ 263.570654] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 263.575939] mount_ns+0x6d/0x190 [ 263.579316] rpc_mount+0x9e/0xd0 [ 263.582693] mount_fs+0x66/0x2d0 [ 263.586068] vfs_kern_mount.part.26+0xc6/0x4a0 [ 263.590658] ? may_umount+0xa0/0xa0 [ 263.594284] ? _raw_read_unlock+0x22/0x30 [ 263.598428] ? __get_fs_type+0x8a/0xc0 [ 263.602325] do_mount+0xea4/0x2bb0 [ 263.606041] ? __might_fault+0x110/0x1d0 [ 263.610116] ? copy_mount_string+0x40/0x40 [ 263.614355] ? __check_object_size+0x8b/0x530 [ 263.618944] ? __might_sleep+0x95/0x190 [ 263.622928] ? kasan_check_write+0x14/0x20 [ 263.627154] ? _copy_from_user+0x99/0x110 [ 263.631304] ? memdup_user+0x5e/0x90 [ 263.635013] ? copy_mount_options+0x1f7/0x2e0 [ 263.639537] SyS_mount+0xab/0x120 [ 263.643034] ? copy_mnt_ns+0xb30/0xb30 [ 263.646922] do_syscall_64+0x281/0x940 [ 263.650804] ? __do_page_fault+0xc90/0xc90 [ 263.655032] ? _raw_spin_unlock_irq+0x27/0x70 [ 263.659533] ? finish_task_switch+0x1c1/0x7e0 [ 263.664036] ? syscall_return_slowpath+0x550/0x550 [ 263.668971] ? syscall_return_slowpath+0x2ac/0x550 [ 263.673931] ? prepare_exit_to_usermode+0x350/0x350 [ 263.679224] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 263.684600] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.689456] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.694641] RIP: 0033:0x4548b9 [ 263.697822] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 263.705529] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 263.712797] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 263.720064] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 263.727336] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2033/05/18 03:33:57 executing program 3 (fault-call:13 fault-nth:7): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x0, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:57 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x0, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 263.734689] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 [ 263.756370] device lo left promiscuous mode [ 263.778417] device lo left promiscuous mode [ 263.797737] device lo entered promiscuous mode [ 263.836788] device lo entered promiscuous mode [ 263.849656] device lo left promiscuous mode [ 263.860661] FAULT_INJECTION: forcing a failure. [ 263.860661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 263.872485] CPU: 0 PID: 32227 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 263.879671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.889106] Call Trace: [ 263.891699] dump_stack+0x194/0x24d [ 263.895335] ? arch_local_irq_restore+0x53/0x53 [ 263.900032] should_fail+0x8c0/0xa40 [ 263.903754] ? find_held_lock+0x35/0x1d0 [ 263.907822] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.912930] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 263.918168] ? pcpu_next_fit_region.constprop.27+0x2a7/0x3a0 [ 263.923990] ? perf_trace_lock_acquire+0xe3/0x980 [ 263.928852] ? perf_trace_lock+0x900/0x900 [ 263.933099] ? should_fail+0x23b/0xa40 [ 263.936995] __alloc_pages_nodemask+0x327/0xdd0 [ 263.941666] ? perf_trace_lock+0x900/0x900 [ 263.945904] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 263.950930] ? find_held_lock+0x35/0x1d0 [ 263.955027] ? check_same_owner+0x320/0x320 [ 263.959345] ? sget_userns+0x27d/0xe40 [ 263.963244] cache_grow_begin+0x72/0x640 [ 263.967317] kmem_cache_alloc_trace+0x3f1/0x740 [ 263.971980] ? security_capable+0x8e/0xc0 [ 263.976236] sget_userns+0x2a3/0xe40 [ 263.979944] ? set_anon_super+0x20/0x20 [ 263.983922] ? put_filp+0x90/0x90 [ 263.987372] ? destroy_unused_super.part.6+0xd0/0xd0 [ 263.992468] ? alloc_vfsmnt+0x762/0x9c0 [ 263.996437] ? path_lookupat+0x238/0xba0 [ 264.000493] ? mnt_free_id.isra.21+0x50/0x50 [ 264.004906] ? trace_hardirqs_off+0x10/0x10 [ 264.009229] ? putname+0xee/0x130 [ 264.012680] ? cap_capable+0x1b5/0x230 [ 264.016577] ? security_capable+0x8e/0xc0 [ 264.020722] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 264.025905] ? ns_capable_common+0xcf/0x160 [ 264.030229] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 264.035412] mount_ns+0x6d/0x190 [ 264.038781] rpc_mount+0x9e/0xd0 [ 264.042149] mount_fs+0x66/0x2d0 [ 264.045518] vfs_kern_mount.part.26+0xc6/0x4a0 [ 264.050100] ? may_umount+0xa0/0xa0 [ 264.053717] ? _raw_read_unlock+0x22/0x30 [ 264.057862] ? __get_fs_type+0x8a/0xc0 [ 264.061756] do_mount+0xea4/0x2bb0 [ 264.065286] ? __might_fault+0x110/0x1d0 [ 264.069351] ? copy_mount_string+0x40/0x40 [ 264.073578] ? __check_object_size+0x8b/0x530 [ 264.078086] ? __might_sleep+0x95/0x190 [ 264.082084] ? kasan_check_write+0x14/0x20 [ 264.086310] ? _copy_from_user+0x99/0x110 [ 264.090457] ? memdup_user+0x5e/0x90 [ 264.094162] ? copy_mount_options+0x1f7/0x2e0 [ 264.098658] SyS_mount+0xab/0x120 [ 264.102106] ? copy_mnt_ns+0xb30/0xb30 [ 264.105993] do_syscall_64+0x281/0x940 [ 264.109959] ? __do_page_fault+0xc90/0xc90 [ 264.114188] ? _raw_spin_unlock_irq+0x27/0x70 [ 264.118678] ? finish_task_switch+0x1c1/0x7e0 [ 264.123170] ? syscall_return_slowpath+0x550/0x550 [ 264.128096] ? syscall_return_slowpath+0x2ac/0x550 [ 264.133034] ? prepare_exit_to_usermode+0x350/0x350 [ 264.138055] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 264.143434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.148292] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.153480] RIP: 0033:0x4548b9 [ 264.156667] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 264.164370] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 264.171631] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 264.178900] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2033/05/18 03:33:58 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:58 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:33:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0x0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 264.186163] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 264.193423] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 264.203769] device lo entered promiscuous mode [ 264.215199] device lo left promiscuous mode [ 264.246356] device lo entered promiscuous mode [ 264.366364] bond0 (unregistering): Released all slaves [ 265.569361] IPVS: ftp: loaded support on port[0] = 21 [ 265.877810] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.314137] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 266.320244] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.365954] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 266.411452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 2033/05/18 03:34:00 executing program 3 (fault-call:13 fault-nth:8): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r2, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000400)={'tunl0\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) r4 = fcntl$dupfd(r2, 0x0, r0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r2, 0x1) sendmsg$nl_netfilter(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x58, 0x0, 0x5, 0x10, 0x70bd25, 0x25dfdbfc, {0xb, 0x0, 0x8}, [@nested={0x34, 0x32, [@generic="a6ee1100a17c81a353558329302c73a3a4617c53d1d2b88d82db0838553183926c4ee807dbb1979e13ea1feb90c7"]}, @nested={0x10, 0x68, [@typed={0xc, 0x76, @u64=0x80}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4080}, 0x4015) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f000031aff8)={r1, r6}) sendmsg$kcm(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000380)={@local, 0x0}, &(0x7f00000003c0)=0x14) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f00000001c0)=0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000400)={'bpq0\x00', r4}) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0x0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000640)="13e8efde3bcdd8beb83ea73ba3bb26f965647a31fd21182fc3fe1bebe75064e67c195f17620d246cc118c7e9390ee5bb8756ac1f9773d1b8802e0c9444ef92235e0cdc37facd84da1141202522c64ca129f759bbe5629c935354f5de140d3ec7c4e7b523be780622eacfe00bde4c8c427911ad6f6b7f0446ce71ab49d1af9241b6ff71a60f36c8dbf3aeb024dbb593f5c479a0ce2ba6149a08bcbed27e91476387a930bf1d5f51ac0daccdb30b60193e6aaec45421e35ba2c75799919fda445c64de2abb9aca7a301a69b2d1374f6a596eb596f8eb66f7b8cb438528c6dd17cea4749a24caf7f7c4f80cb36aefe345", 0xef}], 0x1) eventfd2(0x0, 0x0) r1 = getpid() mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = socket(0x11, 0x100000802, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x41c800, 0x0) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f00000002c0)={&(0x7f0000013000/0x1000)=nil, 0x1000}) r4 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x4001}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x0, @loopback=0x7f000001}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @loopback=0x7f000001}}, [0x5, 0x1, 0x1f, 0x4, 0x5, 0xeaf, 0x6, 0x1, 0x5, 0xfffffffffffffff8, 0x200, 0x9, 0x100, 0xff, 0x401]}, &(0x7f0000000300)=0x100) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000740)={r5, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000380)=0x8, 0x4) r6 = dup2(r2, r4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = userfaultfd(0x0) ioctl$UFFDIO_API(r7, 0xc018aa3f, &(0x7f0000000480)={0xaa}) ioctl$UFFDIO_REGISTER(r8, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) stat(&(0x7f0000000400)='./control/file1\x00', &(0x7f0000002100)) geteuid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000023c0)={{{@in=@local, @in=@remote}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000340)={0x3, 0x8, 0x40, 0x9d07}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'yam0\x00', 0x4}, 0x18) stat(&(0x7f0000002500)='./control\x00', &(0x7f0000002540)) getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002680)={0x0, 0x0, 0x0}, &(0x7f00000026c0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000001e80)=@abs, 0x6e, &(0x7f0000002080)=[{&(0x7f0000001f00)="1d68998bff41e9cec14275b93a9dcdde8d7bf05cfcf70cdc910a42896e67572bd86d3fe345b06abee2aa28ecc2ce511615fbcd2736198918d2f5251a35998642e75f272bdff1f5e040ae36a1a786e404c112ee634184c98d9e3ecdeeb9c13236ab522a824e1328afe8f4d64de2c2de929427cb9c0ecbfe2c013f251e0e495de9ba203effe794dd474220224397cfaf5046a194ee0570e714315de68697019fca0c8d4464c5d61e2f2577d0537c665150f56a00c5e01496efef02ab592c054f2490971b", 0xc3}], 0x1, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000028001e00000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYBLOB="daedc80de5c0b9c3890801f3f5b550c71343ef3edfdb9e6ef1c2875e966e5c812450112716ee7a70b734e53ea235c5cd069a9175a36689e24edd8df08981e7724c16037c35c775ec404a9110bd1e55f4fc810fabe476b68521baec2da52b1db3", @ANYRES32=r9, @ANYBLOB='Y\x00\x00\x00'], 0x48, 0x4000000}, 0x40) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 266.583621] device lo left promiscuous mode [ 266.584150] FAULT_INJECTION: forcing a failure. [ 266.584150] name failslab, interval 1, probability 0, space 0, times 0 [ 266.596290] device lo entered promiscuous mode [ 266.599303] CPU: 0 PID: 32406 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 266.611044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.620391] Call Trace: [ 266.622961] dump_stack+0x194/0x24d [ 266.626572] ? arch_local_irq_restore+0x53/0x53 [ 266.631235] should_fail+0x8c0/0xa40 [ 266.634931] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.640020] ? find_next_zero_bit+0xe3/0x110 [ 266.644411] ? trace_hardirqs_off+0x10/0x10 [ 266.648815] ? __lock_is_held+0xb6/0x140 [ 266.653610] ? find_held_lock+0x35/0x1d0 [ 266.657659] ? __lock_is_held+0xb6/0x140 [ 266.661714] ? check_same_owner+0x320/0x320 [ 266.666019] ? rcu_note_context_switch+0x710/0x710 [ 266.671020] ? rcu_note_context_switch+0x710/0x710 [ 266.675952] should_failslab+0xec/0x120 [ 266.679905] __kmalloc+0x63/0x760 [ 266.683347] ? lockdep_init_map+0x9/0x10 [ 266.687384] ? debug_mutex_init+0x2d/0x60 [ 266.691508] ? __list_lru_init+0xcf/0x750 [ 266.695643] __list_lru_init+0xcf/0x750 [ 266.699610] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 266.705479] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 266.710479] ? __lockdep_init_map+0xe4/0x650 [ 266.714874] ? lockdep_init_map+0x9/0x10 [ 266.718916] sget_userns+0x691/0xe40 [ 266.722604] ? set_anon_super+0x20/0x20 [ 266.726584] ? put_filp+0x90/0x90 [ 266.730027] ? destroy_unused_super.part.6+0xd0/0xd0 [ 266.735103] ? alloc_vfsmnt+0x762/0x9c0 [ 266.739052] ? path_lookupat+0x238/0xba0 [ 266.743091] ? mnt_free_id.isra.21+0x50/0x50 [ 266.747485] ? trace_hardirqs_off+0x10/0x10 [ 266.751787] ? putname+0xee/0x130 [ 266.755230] ? cap_capable+0x1b5/0x230 [ 266.759103] ? security_capable+0x8e/0xc0 [ 266.763233] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 266.768402] ? ns_capable_common+0xcf/0x160 [ 266.772705] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 266.777876] mount_ns+0x6d/0x190 [ 266.781229] rpc_mount+0x9e/0xd0 [ 266.784582] mount_fs+0x66/0x2d0 [ 266.787935] vfs_kern_mount.part.26+0xc6/0x4a0 [ 266.792501] ? may_umount+0xa0/0xa0 [ 266.796114] ? _raw_read_unlock+0x22/0x30 [ 266.800243] ? __get_fs_type+0x8a/0xc0 [ 266.804242] do_mount+0xea4/0x2bb0 [ 266.807758] ? __might_fault+0x110/0x1d0 [ 266.811807] ? copy_mount_string+0x40/0x40 [ 266.816024] ? __check_object_size+0x8b/0x530 [ 266.820538] ? __might_sleep+0x95/0x190 [ 266.824506] ? kasan_check_write+0x14/0x20 [ 266.828719] ? _copy_from_user+0x99/0x110 [ 266.832847] ? memdup_user+0x5e/0x90 [ 266.836537] ? copy_mount_options+0x1f7/0x2e0 [ 266.841019] SyS_mount+0xab/0x120 [ 266.844454] ? copy_mnt_ns+0xb30/0xb30 [ 266.848325] do_syscall_64+0x281/0x940 [ 266.852188] ? __do_page_fault+0xc90/0xc90 [ 266.856408] ? _raw_spin_unlock_irq+0x27/0x70 [ 266.860881] ? finish_task_switch+0x1c1/0x7e0 [ 266.865614] ? syscall_return_slowpath+0x550/0x550 [ 266.870523] ? syscall_return_slowpath+0x2ac/0x550 [ 266.875431] ? prepare_exit_to_usermode+0x350/0x350 [ 266.880424] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 266.885770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.890603] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.895765] RIP: 0033:0x4548b9 [ 266.898932] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 266.906615] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 266.913865] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 266.921112] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2033/05/18 03:34:00 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0x0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:00 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 266.928356] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 266.935604] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 266.962634] device lo left promiscuous mode 2033/05/18 03:34:00 executing program 3 (fault-call:13 fault-nth:9): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 266.997933] device lo entered promiscuous mode [ 267.019131] device lo left promiscuous mode [ 267.053658] device lo entered promiscuous mode [ 267.065166] FAULT_INJECTION: forcing a failure. [ 267.065166] name failslab, interval 1, probability 0, space 0, times 0 [ 267.076464] CPU: 1 PID: 32437 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 267.083649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.092992] Call Trace: [ 267.095572] dump_stack+0x194/0x24d [ 267.099182] ? arch_local_irq_restore+0x53/0x53 [ 267.103833] ? kernel_text_address+0x102/0x140 [ 267.108410] should_fail+0x8c0/0xa40 [ 267.112108] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.117465] ? kasan_kmalloc+0xad/0xe0 [ 267.121328] ? __kmalloc+0x162/0x760 [ 267.125023] ? __list_lru_init+0xcf/0x750 [ 267.129153] ? find_held_lock+0x35/0x1d0 [ 267.133199] ? __lock_is_held+0xb6/0x140 [ 267.137264] ? check_same_owner+0x320/0x320 [ 267.141567] ? rcu_note_context_switch+0x710/0x710 [ 267.146493] should_failslab+0xec/0x120 [ 267.150449] kmem_cache_alloc_node_trace+0x5a/0x760 [ 267.155438] ? mark_held_locks+0xaf/0x100 [ 267.159564] ? __raw_spin_lock_init+0x1c/0x100 [ 267.164132] __kmalloc_node+0x33/0x70 [ 267.168005] kvmalloc_node+0x99/0xd0 [ 267.171789] __list_lru_init+0x5d5/0x750 [ 267.175843] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 267.181707] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.186705] ? __lockdep_init_map+0xe4/0x650 [ 267.191098] ? lockdep_init_map+0x9/0x10 [ 267.195142] sget_userns+0x691/0xe40 [ 267.198831] ? set_anon_super+0x20/0x20 [ 267.202787] ? put_filp+0x90/0x90 [ 267.206222] ? destroy_unused_super.part.6+0xd0/0xd0 [ 267.211310] ? alloc_vfsmnt+0x762/0x9c0 [ 267.215262] ? path_lookupat+0x238/0xba0 [ 267.219297] ? mnt_free_id.isra.21+0x50/0x50 [ 267.223686] ? trace_hardirqs_off+0x10/0x10 [ 267.228074] ? putname+0xee/0x130 [ 267.231510] ? cap_capable+0x1b5/0x230 [ 267.235468] ? security_capable+0x8e/0xc0 [ 267.239599] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 267.244765] ? ns_capable_common+0xcf/0x160 [ 267.249077] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 267.254242] mount_ns+0x6d/0x190 [ 267.257600] rpc_mount+0x9e/0xd0 [ 267.260948] mount_fs+0x66/0x2d0 [ 267.264304] vfs_kern_mount.part.26+0xc6/0x4a0 [ 267.268955] ? may_umount+0xa0/0xa0 [ 267.272561] ? _raw_read_unlock+0x22/0x30 [ 267.276685] ? __get_fs_type+0x8a/0xc0 [ 267.280558] do_mount+0xea4/0x2bb0 [ 267.284079] ? __might_fault+0x110/0x1d0 [ 267.288125] ? copy_mount_string+0x40/0x40 [ 267.292337] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.297334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 267.302082] ? retint_kernel+0x10/0x10 [ 267.305958] ? copy_mount_options+0x19/0x2e0 [ 267.310362] ? copy_mount_options+0x1f2/0x2e0 [ 267.314851] ? copy_mount_options+0x1f7/0x2e0 [ 267.319330] SyS_mount+0xab/0x120 [ 267.322763] ? copy_mnt_ns+0xb30/0xb30 [ 267.326731] do_syscall_64+0x281/0x940 [ 267.330595] ? __do_page_fault+0xc90/0xc90 [ 267.334804] ? _raw_spin_unlock_irq+0x27/0x70 [ 267.339505] ? finish_task_switch+0x1c1/0x7e0 [ 267.343980] ? syscall_return_slowpath+0x550/0x550 [ 267.348891] ? syscall_return_slowpath+0x2ac/0x550 [ 267.353796] ? prepare_exit_to_usermode+0x350/0x350 [ 267.358791] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 267.364146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.368973] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.374405] RIP: 0033:0x4548b9 [ 267.377570] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 267.385252] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 267.392499] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 267.399745] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 267.406988] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 267.414238] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 267.423485] device lo left promiscuous mode 2033/05/18 03:34:01 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 267.455772] device lo entered promiscuous mode 2033/05/18 03:34:01 executing program 7: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r2, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000280)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f00000003c0)={0x0, 0x0, 0x2}) r6 = dup2(r0, r3) ioctl$DRM_IOCTL_GEM_FLINK(r6, 0xc008640a, &(0x7f0000000400)={r4, r5}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r2, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) ioctl$TCXONC(r6, 0x540a, 0xb69) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ef1ced474604337416680cde7db46d3da82c8dc7591d4ef3605be46360a98ea189782569fd1fb0fe7cf2297ff4295205780ded43421a617a67e945e356d8898de33a36a016"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r9 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x89e0, &(0x7f000031aff8)={r1, r8}) sendmsg$kcm(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) ioctl$sock_FIOGETOWN(r9, 0x8903, &(0x7f0000000200)=0x0) r11 = getuid() ioctl$DRM_IOCTL_GET_CLIENT(r7, 0xc0286405, &(0x7f0000000380)={0x0, 0x6, r10, 0x1, r11, 0xdbb5, 0x2, 0x197b466b}) setsockopt$kcm_KCM_RECV_DISABLE(r9, 0x119, 0x1, &(0x7f00000001c0)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x0, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000001c0)=0x4, 0x4) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) socket$inet(0x2, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:01 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x0, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 3 (fault-call:13 fault-nth:10): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'bcsh0\x00', {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) r1 = semget$private(0x0, 0x5, 0x80) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f0000000180)=""/91) 2033/05/18 03:34:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 267.516575] FAULT_INJECTION: forcing a failure. [ 267.516575] name failslab, interval 1, probability 0, space 0, times 0 [ 267.527916] CPU: 1 PID: 32450 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 267.535104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.544464] Call Trace: [ 267.547063] dump_stack+0x194/0x24d [ 267.550691] ? arch_local_irq_restore+0x53/0x53 [ 267.555346] ? __save_stack_trace+0x7e/0xd0 [ 267.559673] should_fail+0x8c0/0xa40 [ 267.563380] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.568471] ? kasan_kmalloc+0xad/0xe0 [ 267.572338] ? kmem_cache_alloc_trace+0x136/0x740 [ 267.577159] ? __memcg_init_list_lru_node+0x169/0x270 [ 267.582328] ? __list_lru_init+0x544/0x750 [ 267.586541] ? sget_userns+0x691/0xe40 [ 267.590411] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 267.595147] ? do_mount+0xea4/0x2bb0 [ 267.598836] ? SyS_mount+0xab/0x120 [ 267.602440] ? do_syscall_64+0x281/0x940 [ 267.606482] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.611843] ? find_held_lock+0x35/0x1d0 [ 267.615898] ? __lock_is_held+0xb6/0x140 [ 267.619971] ? check_same_owner+0x320/0x320 [ 267.624282] ? rcu_note_context_switch+0x710/0x710 [ 267.629209] should_failslab+0xec/0x120 [ 267.633172] kmem_cache_alloc_trace+0x4b/0x740 [ 267.637738] ? __kmalloc_node+0x33/0x70 [ 267.641690] ? __kmalloc_node+0x33/0x70 [ 267.645645] ? rcu_read_lock_sched_held+0x108/0x120 [ 267.650654] __memcg_init_list_lru_node+0x169/0x270 [ 267.655659] ? list_lru_add+0x7c0/0x7c0 [ 267.659616] ? __kmalloc_node+0x47/0x70 [ 267.663588] __list_lru_init+0x544/0x750 [ 267.667641] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 267.673509] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.678509] ? __lockdep_init_map+0xe4/0x650 [ 267.682906] ? lockdep_init_map+0x9/0x10 [ 267.686956] sget_userns+0x691/0xe40 [ 267.690647] ? set_anon_super+0x20/0x20 [ 267.694612] ? put_filp+0x90/0x90 [ 267.698051] ? destroy_unused_super.part.6+0xd0/0xd0 [ 267.703130] ? alloc_vfsmnt+0x762/0x9c0 [ 267.707092] ? mnt_free_id.isra.21+0x50/0x50 [ 267.711492] ? trace_hardirqs_off+0x10/0x10 [ 267.715803] ? putname+0xee/0x130 [ 267.719244] ? cap_capable+0x1b5/0x230 [ 267.723133] ? security_capable+0x8e/0xc0 [ 267.727271] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 267.732440] ? ns_capable_common+0xcf/0x160 [ 267.736753] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 267.741920] mount_ns+0x6d/0x190 [ 267.745276] rpc_mount+0x9e/0xd0 [ 267.748629] mount_fs+0x66/0x2d0 [ 267.751990] vfs_kern_mount.part.26+0xc6/0x4a0 [ 267.756565] ? may_umount+0xa0/0xa0 [ 267.760173] ? _raw_read_unlock+0x22/0x30 [ 267.764302] ? __get_fs_type+0x8a/0xc0 [ 267.768194] do_mount+0xea4/0x2bb0 [ 267.771717] ? __might_fault+0x110/0x1d0 [ 267.775773] ? copy_mount_string+0x40/0x40 [ 267.779986] ? check_same_owner+0x320/0x320 [ 267.784295] ? __check_object_size+0x8b/0x530 [ 267.788786] ? __might_sleep+0x95/0x190 [ 267.792760] ? kasan_check_write+0x14/0x20 [ 267.796976] ? _copy_from_user+0x99/0x110 [ 267.801204] ? memdup_user+0x5e/0x90 [ 267.804901] ? copy_mount_options+0x1f7/0x2e0 [ 267.809390] SyS_mount+0xab/0x120 [ 267.812831] ? copy_mnt_ns+0xb30/0xb30 [ 267.816704] do_syscall_64+0x281/0x940 [ 267.820569] ? __do_page_fault+0xc90/0xc90 [ 267.824788] ? _raw_spin_unlock_irq+0x27/0x70 [ 267.829267] ? finish_task_switch+0x1c1/0x7e0 [ 267.833756] ? syscall_return_slowpath+0x550/0x550 [ 267.838668] ? syscall_return_slowpath+0x2ac/0x550 [ 267.843579] ? prepare_exit_to_usermode+0x350/0x350 [ 267.848578] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 267.853937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.858863] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.864033] RIP: 0033:0x4548b9 [ 267.867204] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 267.874893] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 267.882228] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 267.889476] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 267.896725] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 267.903971] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2033/05/18 03:34:01 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x0, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 267.927092] device lo left promiscuous mode 2033/05/18 03:34:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x0, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 3 (fault-call:13 fault-nth:11): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 2: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) clone(0x0, &(0x7f0000178000), &(0x7f00000f4000), &(0x7f00000001c0), &(0x7f00008b4000)) readv(r2, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/30, 0x1e}], 0x1) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000080)={'teql0\x00', {0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000002c0)) setsockopt$inet_mreqn(r4, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00002b9fd4)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x1, [@loopback=0x7f000001]}, 0x14) setsockopt$inet_mreqsrc(r4, 0x0, 0x0, &(0x7f0000231000)={@multicast2=0xe0000002, @loopback=0x7f000001, @loopback=0x7f000001}, 0xc) setsockopt$inet_tcp_int(r4, 0x6, 0x1f, &(0x7f00000001c0)=0x493, 0x4) setsockopt$inet_mreqsrc(r4, 0x0, 0x25, &(0x7f0000c26000)={@multicast2=0xe0000002, @remote={0xac, 0x14, 0x14, 0xbb}, @broadcast=0xffffffff}, 0xc) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}}) r5 = socket$inet(0x2, 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) r6 = gettid() sched_getparam(r6, &(0x7f00000004c0)) r7 = socket$inet(0xa, 0x801, 0xfeffffffffffffff) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r8, 0x80dc5521, &(0x7f0000000340)=""/211) setsockopt$sock_linger(r7, 0x1, 0x33, &(0x7f0000000280), 0x6) r9 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x8, 0x100) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r9, 0x28, 0x6, &(0x7f0000000240)={0x0, 0x2710}, 0x10) connect$l2tp(0xffffffffffffffff, &(0x7f0000e92000)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e21, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x2, 0x0, 0x4}}, 0x313) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x80000000, 0x482200) close(r5) connect$l2tp(r3, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e22, @rand_addr=0x2}, 0x2, 0x0, 0x4, 0x1}}, 0x2e) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4000) [ 267.950624] device lo left promiscuous mode [ 267.960609] device lo entered promiscuous mode 2033/05/18 03:34:01 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x0, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:01 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 268.044674] FAULT_INJECTION: forcing a failure. [ 268.044674] name failslab, interval 1, probability 0, space 0, times 0 [ 268.056129] CPU: 1 PID: 32475 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 268.063322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.072672] Call Trace: [ 268.075245] dump_stack+0x194/0x24d [ 268.078857] ? arch_local_irq_restore+0x53/0x53 [ 268.083502] ? __save_stack_trace+0x7e/0xd0 [ 268.087820] should_fail+0x8c0/0xa40 [ 268.091520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.096601] ? kasan_kmalloc+0xad/0xe0 [ 268.100464] ? kmem_cache_alloc_trace+0x136/0x740 [ 268.105291] ? __memcg_init_list_lru_node+0x169/0x270 [ 268.110454] ? __list_lru_init+0x544/0x750 [ 268.114662] ? sget_userns+0x691/0xe40 [ 268.118529] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.123261] ? do_mount+0xea4/0x2bb0 [ 268.126947] ? SyS_mount+0xab/0x120 [ 268.130558] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.135905] ? find_held_lock+0x35/0x1d0 [ 268.139951] ? __lock_is_held+0xb6/0x140 [ 268.144014] ? check_same_owner+0x320/0x320 [ 268.148315] ? rcu_note_context_switch+0x710/0x710 [ 268.153232] should_failslab+0xec/0x120 [ 268.157188] kmem_cache_alloc_trace+0x4b/0x740 [ 268.161748] ? __kmalloc_node+0x33/0x70 [ 268.165698] ? __kmalloc_node+0x33/0x70 [ 268.169649] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.174649] __memcg_init_list_lru_node+0x169/0x270 [ 268.180091] ? list_lru_add+0x7c0/0x7c0 [ 268.184045] ? __kmalloc_node+0x47/0x70 [ 268.188028] __list_lru_init+0x544/0x750 [ 268.192075] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 268.197937] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 268.203028] ? __lockdep_init_map+0xe4/0x650 [ 268.207417] ? lockdep_init_map+0x9/0x10 [ 268.211457] sget_userns+0x691/0xe40 [ 268.215144] ? set_anon_super+0x20/0x20 [ 268.219118] ? put_filp+0x90/0x90 [ 268.222554] ? destroy_unused_super.part.6+0xd0/0xd0 [ 268.227718] ? alloc_vfsmnt+0x762/0x9c0 [ 268.231670] ? path_lookupat+0x238/0xba0 [ 268.235749] ? mnt_free_id.isra.21+0x50/0x50 [ 268.240141] ? trace_hardirqs_off+0x10/0x10 [ 268.245141] ? putname+0xee/0x130 [ 268.248580] ? cap_capable+0x1b5/0x230 [ 268.252454] ? security_capable+0x8e/0xc0 [ 268.256583] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 268.261765] ? ns_capable_common+0xcf/0x160 [ 268.267029] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 268.272196] mount_ns+0x6d/0x190 [ 268.275546] rpc_mount+0x9e/0xd0 [ 268.278902] mount_fs+0x66/0x2d0 [ 268.282249] vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.286812] ? may_umount+0xa0/0xa0 [ 268.290423] ? _raw_read_unlock+0x22/0x30 [ 268.294549] ? __get_fs_type+0x8a/0xc0 [ 268.298420] do_mount+0xea4/0x2bb0 [ 268.301938] ? __might_fault+0x110/0x1d0 [ 268.305986] ? copy_mount_string+0x40/0x40 [ 268.310203] ? __check_object_size+0x8b/0x530 [ 268.314688] ? __might_sleep+0x95/0x190 [ 268.318648] ? kasan_check_write+0x14/0x20 [ 268.322860] ? _copy_from_user+0x99/0x110 [ 268.326989] ? memdup_user+0x5e/0x90 [ 268.330682] ? copy_mount_options+0x1f7/0x2e0 [ 268.335165] SyS_mount+0xab/0x120 [ 268.338613] ? copy_mnt_ns+0xb30/0xb30 [ 268.342573] do_syscall_64+0x281/0x940 [ 268.346442] ? __do_page_fault+0xc90/0xc90 [ 268.350654] ? _raw_spin_unlock_irq+0x27/0x70 [ 268.355127] ? finish_task_switch+0x1c1/0x7e0 [ 268.359601] ? syscall_return_slowpath+0x550/0x550 [ 268.364508] ? syscall_return_slowpath+0x2ac/0x550 [ 268.369420] ? prepare_exit_to_usermode+0x350/0x350 [ 268.374422] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 268.379775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.384606] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.390465] RIP: 0033:0x4548b9 [ 268.393719] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.401578] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 268.408823] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 268.416076] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 268.423319] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 268.430562] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 268.470920] device lo left promiscuous mode [ 268.481289] device lo entered promiscuous mode 2033/05/18 03:34:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x0, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = syz_open_dev$adsp(&(0x7f0000000980)='/dev/adsp#\x00', 0x6, 0x10000) recvmsg$kcm(r3, &(0x7f0000002b40)={&(0x7f00000009c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/153, 0x99}], 0x2, &(0x7f0000001b40)=""/4096, 0x1000}, 0x2) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800009f9abec2578800000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000280)=0x4) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f00000002c0)={&(0x7f0000ffb000/0x1000)=nil, 0x7, 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x6}) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:02 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x0, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 3 (fault-call:13 fault-nth:12): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 2: r0 = semget(0x0, 0x4, 0x10) semctl$GETPID(r0, 0x3, 0xb, &(0x7f00000000c0)=""/142) r1 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000a100)={0x7, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000ac8d2f0ca0df8c3cdae2b107a5a118a8efecae997df791a80a6379b28f40e8600e8b41ac1ce7c8395a0eac57b2d0a1aefb3a32d7c09c143a3cf56197d244668258937e176f861603a01fc8b042d67192d049ce28642a030aa7a137d098cbb186b3fc8569b9d1a65c63d712aa7cfcf51744a225a3845f"], &(0x7f000000a000)='GPL\x00', 0x3, 0xb2, &(0x7f000000a040)=""/178}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 2033/05/18 03:34:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x6, @empty, 0x401}}, [0x3, 0x5, 0xffffffffffffffda, 0x4, 0xf800000000000000, 0x6, 0x418c, 0x3e, 0x4, 0x0, 0x20, 0x65b, 0x2, 0x80000000, 0xe9]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={r3, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}, 0x0, 0x80000000, 0xfffffffffffffe00, 0x3, 0x90}, &(0x7f0000000280)=0x98) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 268.610905] FAULT_INJECTION: forcing a failure. [ 268.610905] name failslab, interval 1, probability 0, space 0, times 0 [ 268.622366] CPU: 1 PID: 32504 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 268.629554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.638916] Call Trace: [ 268.641492] dump_stack+0x194/0x24d [ 268.645122] ? arch_local_irq_restore+0x53/0x53 [ 268.649794] ? __save_stack_trace+0x7e/0xd0 [ 268.654132] should_fail+0x8c0/0xa40 [ 268.657860] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.662959] ? kasan_kmalloc+0xad/0xe0 [ 268.666830] ? kmem_cache_alloc_trace+0x136/0x740 [ 268.671664] ? __memcg_init_list_lru_node+0x169/0x270 [ 268.676834] ? __list_lru_init+0x544/0x750 [ 268.681052] ? sget_userns+0x691/0xe40 [ 268.684926] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.689658] ? do_mount+0xea4/0x2bb0 [ 268.693356] ? SyS_mount+0xab/0x120 [ 268.697065] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.702444] ? find_held_lock+0x35/0x1d0 [ 268.706520] ? __lock_is_held+0xb6/0x140 [ 268.710582] ? check_same_owner+0x320/0x320 [ 268.714895] ? rcu_note_context_switch+0x710/0x710 [ 268.719909] should_failslab+0xec/0x120 [ 268.723868] kmem_cache_alloc_trace+0x4b/0x740 [ 268.728433] ? __kmalloc_node+0x33/0x70 [ 268.732406] ? __kmalloc_node+0x33/0x70 [ 268.736378] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.741400] __memcg_init_list_lru_node+0x169/0x270 [ 268.746423] ? list_lru_add+0x7c0/0x7c0 [ 268.750436] ? __kmalloc_node+0x47/0x70 [ 268.754404] __list_lru_init+0x544/0x750 [ 268.758449] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 268.764404] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 268.769408] ? __lockdep_init_map+0xe4/0x650 [ 268.773810] ? lockdep_init_map+0x9/0x10 [ 268.777861] sget_userns+0x691/0xe40 [ 268.781549] ? set_anon_super+0x20/0x20 [ 268.785505] ? put_filp+0x90/0x90 [ 268.788948] ? destroy_unused_super.part.6+0xd0/0xd0 [ 268.794048] ? alloc_vfsmnt+0x762/0x9c0 [ 268.798025] ? path_lookupat+0x238/0xba0 [ 268.802071] ? mnt_free_id.isra.21+0x50/0x50 [ 268.806469] ? trace_hardirqs_off+0x10/0x10 [ 268.810785] ? putname+0xee/0x130 [ 268.814228] ? cap_capable+0x1b5/0x230 [ 268.818114] ? security_capable+0x8e/0xc0 [ 268.822258] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 268.827442] ? ns_capable_common+0xcf/0x160 [ 268.831754] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 268.836928] mount_ns+0x6d/0x190 [ 268.840304] rpc_mount+0x9e/0xd0 [ 268.843680] mount_fs+0x66/0x2d0 [ 268.847045] vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.851608] ? may_umount+0xa0/0xa0 [ 268.855214] ? _raw_read_unlock+0x22/0x30 [ 268.859340] ? __get_fs_type+0x8a/0xc0 [ 268.863213] do_mount+0xea4/0x2bb0 [ 268.866738] ? __might_fault+0x110/0x1d0 [ 268.870883] ? copy_mount_string+0x40/0x40 [ 268.875112] ? __check_object_size+0x8b/0x530 [ 268.879596] ? __might_sleep+0x95/0x190 [ 268.883558] ? kasan_check_write+0x14/0x20 [ 268.887778] ? _copy_from_user+0x99/0x110 [ 268.891926] ? memdup_user+0x5e/0x90 [ 268.896317] ? copy_mount_options+0x1f7/0x2e0 [ 268.900807] SyS_mount+0xab/0x120 [ 268.904246] ? copy_mnt_ns+0xb30/0xb30 [ 268.908135] do_syscall_64+0x281/0x940 [ 268.912003] ? __do_page_fault+0xc90/0xc90 [ 268.916231] ? _raw_spin_unlock_irq+0x27/0x70 [ 268.920708] ? finish_task_switch+0x1c1/0x7e0 [ 268.925199] ? syscall_return_slowpath+0x550/0x550 [ 268.930132] ? syscall_return_slowpath+0x2ac/0x550 [ 268.935061] ? prepare_exit_to_usermode+0x350/0x350 [ 268.940059] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 268.945418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.950265] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.955436] RIP: 0033:0x4548b9 2033/05/18 03:34:02 executing program 2: socketpair(0x1d, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e20, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x3c}, {0xa, 0x4e20, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, 0x6, [0x80, 0xdcb, 0xef, 0x2a, 0x7, 0x2, 0x7fff, 0x3f]}, 0x5c) munmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000180)={'ip_vti0\x00', {0x2, 0x4e24, @rand_addr=0x4}}) setsockopt$inet6_buf(r1, 0x29, 0x32, &(0x7f00000001c0)="bd1d1992fefefd146bcf8b8b7f22867d7845fa5eae78ed170753c65768a4cb5df655f90c074842f958716129c7603e4d48bb595b5d2e26ed2ccfffc08925bd364149f4451447d585cb619f77fa9c583d", 0x50) r2 = socket$inet6(0xa, 0x806, 0x0) listen(r2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x10d, 0xa, &(0x7f0000019b50)=ANY=[@ANYBLOB="0f0000000000000000000000000000000000000000000000000000000000000009000000030000008802000000000000ffffffffffffffff80030000ffffffff80030000ffffffffffffffff80030000ffffffff03000000", @ANYRES32, @ANYBLOB="fe8000000000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800c8000000000000000000000000000000000000000000000000002000545241434500000000000000000000000000000000000000000d3da3a2790000000000ff020000000000000000000000000001fe8000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a8002efe000000000000000000000000000000000000000000000000eb9c4354000000000000000000000000000000000000000000000000000000000000000000000000000000006e657462696f732d6e730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800e9020000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000001600feffff"], 0x3) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x5}, 0x4) [ 268.958600] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.966369] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 268.973965] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 268.981210] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 268.988462] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 268.995723] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2033/05/18 03:34:02 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) connect$bt_l2cap(0xffffffffffffffff, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x0, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 3 (fault-call:13 fault-nth:13): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x0, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 269.013247] device lo left promiscuous mode [ 269.029643] device lo entered promiscuous mode [ 269.039765] device lo entered promiscuous mode [ 269.048979] device lo left promiscuous mode [ 269.055271] can: request_module (can-proto-4) failed. [ 269.055600] device lo entered promiscuous mode [ 269.103319] FAULT_INJECTION: forcing a failure. [ 269.103319] name failslab, interval 1, probability 0, space 0, times 0 [ 269.110302] can: request_module (can-proto-4) failed. [ 269.114660] CPU: 0 PID: 32531 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 269.127481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.136830] Call Trace: [ 269.139419] dump_stack+0x194/0x24d [ 269.143055] ? arch_local_irq_restore+0x53/0x53 [ 269.147809] ? __save_stack_trace+0x7e/0xd0 2033/05/18 03:34:03 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r3, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f000087bd32)={0x28, 0x18, 0xffffffffffffffff, 0x0, 0x0, {0x1}, [@nested={0x14, 0x3, [@typed={0x10, 0x0, @u64}]}]}, 0x28}, 0x1}, 0x0) ioctl$VT_RELDISP(r1, 0x5605) timer_create(0x7, &(0x7f0000000540)={0x0, 0x1b, 0x7, @thr={&(0x7f0000000440)="81be57fb29bb5396d6c7b872f7ded1559f5ec3fd23a7f18fee833d9ad36b0b54f2ca41cdb17da02ecf60054af08c836d", &(0x7f0000000480)="a5f28aca6bb0aeeee823b7c651fee6ddaf123b734bbfb6636657636ae1f0e22ad849f227fb7fcf45209d57ba5861c51da23e30843792ff440c1347c0b4d1fa997205e1f497b66cb982ccb8f82a03e1df2ea5ea4290bb1d4863a454ab8b2d200bae18c85a0438851de612079d659bb1844b58ff720744108696e26c15d384a675592a63226eeaa5fa8cfa09596859c4ed6c14fbc51a1fcd148e5ac86dda539c3ae7b57b1e3304c90df8ac48"}}, &(0x7f0000000580)) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f00000000c0)) gettid() ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0xffff) r5 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x8, 0x349c40) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000340)=0x3, 0x3, 0x0) getsockname(r3, &(0x7f00000002c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000400)=0x80) syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x2, 0x400) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000080)={0x60000006}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r5, &(0x7f0000000140)="38f20ff8f1127c3c8f3481d4522ca911602bf1e2c5d77343160e94b4f4bda5c95022b224d05cd9aa2830dbd25521531e4581de368757b685d6cb36dfeddca9bc51a4662d4e88a9da83e9aaee2ca538cca6415bd066901dc4219655ce00f9aa1c38b1716ce0107208f78c8ea0d412ab560608fb94114f72f65eec26185c14216bcc6e54d084aaf9f8e74e317a1b45c9d6ce7cc8de2fd106b634053deff225508f5c3f1f5c6862b68021889b052cb8b4ea2bfcc58f223b2c19761b83ab08ea4deb86f160b2d8c92f9193c8caa62afefc83942fd6ed2aff84542178191c69d0de10c2d23da757982a1cd3d050b7"}, 0x10) fcntl$setflags(r5, 0x2, 0x1) keyctl$revoke(0x3, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f00004b4000)=[{}], 0x15555701, 0x0) close(r4) epoll_create1(0x0) bind$inet6(r1, &(0x7f00000003c0)={0xa, 0x4e21, 0x6, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, 0x1c) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x6) 2033/05/18 03:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x7ff, 0x42080) setsockopt$packet_buf(r2, 0x107, 0x1, &(0x7f00000004c0)="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", 0x1000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x40800) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x0, &(0x7f00009ff000)=ANY=[], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x1}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 269.152153] should_fail+0x8c0/0xa40 [ 269.155875] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.160973] ? kasan_kmalloc+0xad/0xe0 [ 269.164852] ? kmem_cache_alloc_trace+0x136/0x740 [ 269.169690] ? __memcg_init_list_lru_node+0x169/0x270 [ 269.174879] ? __list_lru_init+0x544/0x750 [ 269.179124] ? sget_userns+0x691/0xe40 [ 269.183014] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.187769] ? do_mount+0xea4/0x2bb0 [ 269.191484] ? SyS_mount+0xab/0x120 [ 269.195104] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.200481] ? find_held_lock+0x35/0x1d0 [ 269.204542] ? __lock_is_held+0xb6/0x140 [ 269.208617] ? check_same_owner+0x320/0x320 [ 269.212940] ? rcu_note_context_switch+0x710/0x710 [ 269.217873] should_failslab+0xec/0x120 [ 269.221832] kmem_cache_alloc_trace+0x4b/0x740 [ 269.226392] ? __kmalloc_node+0x33/0x70 [ 269.230350] ? __kmalloc_node+0x33/0x70 [ 269.234310] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.239311] __memcg_init_list_lru_node+0x169/0x270 [ 269.244307] ? list_lru_add+0x7c0/0x7c0 [ 269.248257] ? __kmalloc_node+0x47/0x70 [ 269.252219] __list_lru_init+0x544/0x750 [ 269.256264] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 269.262222] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 269.267225] ? __lockdep_init_map+0xe4/0x650 [ 269.271613] ? lockdep_init_map+0x9/0x10 [ 269.275658] sget_userns+0x691/0xe40 [ 269.279352] ? set_anon_super+0x20/0x20 [ 269.283402] ? put_filp+0x90/0x90 [ 269.286834] ? destroy_unused_super.part.6+0xd0/0xd0 [ 269.291917] ? alloc_vfsmnt+0x762/0x9c0 [ 269.295866] ? path_lookupat+0x238/0xba0 [ 269.299904] ? mnt_free_id.isra.21+0x50/0x50 [ 269.304295] ? trace_hardirqs_off+0x10/0x10 [ 269.308600] ? putname+0xee/0x130 [ 269.312035] ? cap_capable+0x1b5/0x230 [ 269.315909] ? security_capable+0x8e/0xc0 [ 269.320044] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 269.325209] ? ns_capable_common+0xcf/0x160 [ 269.329512] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 269.334692] mount_ns+0x6d/0x190 [ 269.338046] rpc_mount+0x9e/0xd0 [ 269.341395] mount_fs+0x66/0x2d0 [ 269.344747] vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.349307] ? may_umount+0xa0/0xa0 [ 269.352915] ? _raw_read_unlock+0x22/0x30 [ 269.357063] ? __get_fs_type+0x8a/0xc0 [ 269.360935] do_mount+0xea4/0x2bb0 [ 269.364448] ? __might_fault+0x110/0x1d0 [ 269.368493] ? copy_mount_string+0x40/0x40 [ 269.372707] ? __check_object_size+0x8b/0x530 [ 269.377192] ? __might_sleep+0x95/0x190 [ 269.381152] ? kasan_check_write+0x14/0x20 [ 269.385363] ? _copy_from_user+0x99/0x110 [ 269.389493] ? memdup_user+0x5e/0x90 [ 269.393184] ? copy_mount_options+0x1f7/0x2e0 [ 269.397668] SyS_mount+0xab/0x120 [ 269.401098] ? copy_mnt_ns+0xb30/0xb30 [ 269.404966] do_syscall_64+0x281/0x940 [ 269.408829] ? __do_page_fault+0xc90/0xc90 [ 269.413039] ? _raw_spin_unlock_irq+0x27/0x70 [ 269.417511] ? finish_task_switch+0x1c1/0x7e0 [ 269.421985] ? syscall_return_slowpath+0x550/0x550 [ 269.426897] ? syscall_return_slowpath+0x2ac/0x550 [ 269.431803] ? prepare_exit_to_usermode+0x350/0x350 [ 269.436800] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 269.442153] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.446981] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2033/05/18 03:34:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x0, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 269.452156] RIP: 0033:0x4548b9 [ 269.455319] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 269.463008] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 269.470254] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 269.477497] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 269.484740] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 269.491991] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 269.527036] device lo left promiscuous mode [ 269.535758] device lo left promiscuous mode [ 269.562649] device lo entered promiscuous mode 2033/05/18 03:34:03 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x0, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 3 (fault-call:13 fault-nth:14): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000000000000aabe30936778526775b3c15dae59ff00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x90040) 2033/05/18 03:34:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x0, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 2: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x2c1369}) bpf$PROG_LOAD(0x5, &(0x7f00006f4fb8)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000100000000000000232b300000050000000000000000000000000000009500000000"], &(0x7f0000003ff6)="73c57a6b616c49657200", 0xea6c, 0xc3, &(0x7f0000000000)=""/195, 0x3fffffffffff, 0xffffffffffffffff}, 0x48) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x10) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000002c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000180)="97e1e7068aa558f25fa3ddf54ce472a317eea4b1a7a3727e9d22c7", &(0x7f00000001c0)=""/191}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x28, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={r1, 0x1, 0x10}, 0xc) [ 269.573946] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 269.581929] netlink: 'syz-executor2': attribute type 3 has an invalid length. [ 269.591240] device lo entered promiscuous mode [ 269.602562] device lo left promiscuous mode [ 269.608286] device lo entered promiscuous mode 2033/05/18 03:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x4, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:03 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000001540)=r1) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000002c0)={{0x43, 0x0, 0x0, 0x0, "0900078ddb4486dccb7ebea706000000000000000400000b610600001d450aa4fa9e70687020c503cf2683fa"}, 0x0, 0x0, 0x0, r1, 0x0, 0x0, "7d5d493c3bbaad3ba10bd103a11064003a924474d833f0b8e1e89e778c9cf30ea93a1babcaf4e5e55c44829060ea0951dab326d1f0499d3a0cdb195d7896e37b", &(0x7f0000000080)='(^\x00', 0x3}) connect$bt_l2cap(0xffffffffffffff9c, &(0x7f0000001580)={0x1f, 0x101, {0x401, 0x200, 0xb56, 0x0, 0x81, 0xe17}, 0x1, 0x70000}, 0xe) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x40) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f00000000c0)=""/220) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000001640)=@assoc_id=0x0, &(0x7f0000001600)=0xfffffffffffffdc6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001440)={0x0}, &(0x7f0000001480)=0xc) migrate_pages(r5, 0x2dde, &(0x7f00000014c0)=0x2, &(0x7f0000001500)=0x13c3) r6 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r6) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000240)={r4, 0x380000000000000}, &(0x7f0000000280)=0x8) setsockopt$llc_int(r3, 0x10c, 0xb, &(0x7f0000001400), 0x4) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000400)=""/4096) [ 269.672107] FAULT_INJECTION: forcing a failure. [ 269.672107] name failslab, interval 1, probability 0, space 0, times 0 [ 269.683565] CPU: 0 PID: 32561 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 269.690752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.700112] Call Trace: [ 269.702702] dump_stack+0x194/0x24d [ 269.706317] ? arch_local_irq_restore+0x53/0x53 [ 269.710977] ? __save_stack_trace+0x7e/0xd0 [ 269.715318] should_fail+0x8c0/0xa40 2033/05/18 03:34:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f000068b000)='io\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000200), 0x1b) [ 269.719038] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.724139] ? kasan_kmalloc+0xad/0xe0 [ 269.728022] ? kmem_cache_alloc_trace+0x136/0x740 [ 269.732857] ? __memcg_init_list_lru_node+0x169/0x270 [ 269.738035] ? __list_lru_init+0x544/0x750 [ 269.742261] ? sget_userns+0x691/0xe40 [ 269.746152] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.750903] ? do_mount+0xea4/0x2bb0 [ 269.754612] ? SyS_mount+0xab/0x120 [ 269.758235] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.763596] ? find_held_lock+0x35/0x1d0 [ 269.767665] ? __lock_is_held+0xb6/0x140 2033/05/18 03:34:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x200001, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) [ 269.771736] ? check_same_owner+0x320/0x320 [ 269.776060] ? rcu_note_context_switch+0x710/0x710 [ 269.781000] should_failslab+0xec/0x120 [ 269.784983] kmem_cache_alloc_trace+0x4b/0x740 [ 269.789563] ? __kmalloc_node+0x33/0x70 [ 269.793539] ? __kmalloc_node+0x33/0x70 [ 269.797507] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.802513] __memcg_init_list_lru_node+0x169/0x270 [ 269.807533] ? list_lru_add+0x7c0/0x7c0 [ 269.811748] ? __kmalloc_node+0x47/0x70 [ 269.815716] __list_lru_init+0x544/0x750 [ 269.819768] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 269.825636] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 269.830640] ? __lockdep_init_map+0xe4/0x650 [ 269.835030] ? lockdep_init_map+0x9/0x10 [ 269.839072] sget_userns+0x691/0xe40 [ 269.842761] ? set_anon_super+0x20/0x20 [ 269.846726] ? put_filp+0x90/0x90 [ 269.850163] ? destroy_unused_super.part.6+0xd0/0xd0 [ 269.855244] ? alloc_vfsmnt+0x762/0x9c0 [ 269.859199] ? mnt_free_id.isra.21+0x50/0x50 [ 269.863591] ? trace_hardirqs_off+0x10/0x10 [ 269.867893] ? putname+0xee/0x130 [ 269.871329] ? cap_capable+0x1b5/0x230 [ 269.875201] ? security_capable+0x8e/0xc0 [ 269.879333] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 269.884500] ? ns_capable_common+0xcf/0x160 [ 269.888807] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 269.893972] mount_ns+0x6d/0x190 [ 269.897320] rpc_mount+0x9e/0xd0 [ 269.900676] mount_fs+0x66/0x2d0 [ 269.904030] vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.908590] ? may_umount+0xa0/0xa0 [ 269.912197] ? _raw_read_unlock+0x22/0x30 [ 269.916320] ? __get_fs_type+0x8a/0xc0 [ 269.920206] do_mount+0xea4/0x2bb0 [ 269.923722] ? __might_fault+0x110/0x1d0 [ 269.927770] ? copy_mount_string+0x40/0x40 [ 269.931981] ? __check_object_size+0x8b/0x530 [ 269.936473] ? __might_sleep+0x95/0x190 [ 269.940434] ? kasan_check_write+0x14/0x20 [ 269.944643] ? _copy_from_user+0x99/0x110 [ 269.948771] ? memdup_user+0x5e/0x90 [ 269.952463] ? copy_mount_options+0x1f7/0x2e0 [ 269.956947] SyS_mount+0xab/0x120 [ 269.960382] ? copy_mnt_ns+0xb30/0xb30 [ 269.964257] do_syscall_64+0x281/0x940 [ 269.968117] ? __do_page_fault+0xc90/0xc90 [ 269.972328] ? _raw_spin_unlock_irq+0x27/0x70 [ 269.976801] ? finish_task_switch+0x1c1/0x7e0 [ 269.981273] ? syscall_return_slowpath+0x550/0x550 [ 269.986179] ? syscall_return_slowpath+0x2ac/0x550 [ 269.991092] ? prepare_exit_to_usermode+0x350/0x350 [ 269.996087] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 270.001432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.006261] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.011427] RIP: 0033:0x4548b9 [ 270.014599] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:34:03 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 270.022281] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 270.029533] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 270.036777] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 270.044030] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 270.051273] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 270.060934] device lo left promiscuous mode 2033/05/18 03:34:03 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:03 executing program 3 (fault-call:13 fault-nth:15): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 270.092152] device lo entered promiscuous mode [ 270.099335] device lo left promiscuous mode [ 270.106512] device lo entered promiscuous mode [ 270.124389] device lo left promiscuous mode [ 270.143367] device lo entered promiscuous mode [ 270.168771] FAULT_INJECTION: forcing a failure. [ 270.168771] name failslab, interval 1, probability 0, space 0, times 0 [ 270.180649] CPU: 1 PID: 32590 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 270.187834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.197183] Call Trace: [ 270.199762] dump_stack+0x194/0x24d [ 270.203373] ? arch_local_irq_restore+0x53/0x53 [ 270.208042] ? __save_stack_trace+0x7e/0xd0 [ 270.212360] should_fail+0x8c0/0xa40 [ 270.216059] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.221157] ? kasan_kmalloc+0xad/0xe0 [ 270.225031] ? kmem_cache_alloc_trace+0x136/0x740 [ 270.229847] ? __memcg_init_list_lru_node+0x169/0x270 [ 270.235014] ? __list_lru_init+0x544/0x750 [ 270.239232] ? sget_userns+0x691/0xe40 [ 270.243106] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 270.247923] ? do_mount+0xea4/0x2bb0 [ 270.251612] ? SyS_mount+0xab/0x120 [ 270.255231] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.260594] ? find_held_lock+0x35/0x1d0 [ 270.264642] ? __lock_is_held+0xb6/0x140 [ 270.268700] ? check_same_owner+0x320/0x320 [ 270.273007] ? rcu_note_context_switch+0x710/0x710 [ 270.277938] should_failslab+0xec/0x120 [ 270.281894] kmem_cache_alloc_trace+0x4b/0x740 [ 270.286457] ? __kmalloc_node+0x33/0x70 [ 270.290407] ? __kmalloc_node+0x33/0x70 [ 270.294359] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.299361] __memcg_init_list_lru_node+0x169/0x270 [ 270.304359] ? list_lru_add+0x7c0/0x7c0 [ 270.308310] ? __kmalloc_node+0x47/0x70 [ 270.312273] __list_lru_init+0x544/0x750 [ 270.316321] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 270.322183] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 270.327272] ? __lockdep_init_map+0xe4/0x650 [ 270.331668] ? lockdep_init_map+0x9/0x10 [ 270.335710] sget_userns+0x691/0xe40 [ 270.339399] ? set_anon_super+0x20/0x20 [ 270.343358] ? put_filp+0x90/0x90 [ 270.346792] ? destroy_unused_super.part.6+0xd0/0xd0 [ 270.351870] ? alloc_vfsmnt+0x762/0x9c0 [ 270.355823] ? path_lookupat+0x238/0xba0 [ 270.359862] ? mnt_free_id.isra.21+0x50/0x50 [ 270.364254] ? trace_hardirqs_off+0x10/0x10 [ 270.368558] ? putname+0xee/0x130 [ 270.372425] ? cap_capable+0x1b5/0x230 [ 270.376313] ? security_capable+0x8e/0xc0 [ 270.380445] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 270.385612] ? ns_capable_common+0xcf/0x160 [ 270.389919] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 270.395086] mount_ns+0x6d/0x190 [ 270.398438] rpc_mount+0x9e/0xd0 [ 270.401789] mount_fs+0x66/0x2d0 [ 270.405139] vfs_kern_mount.part.26+0xc6/0x4a0 [ 270.409698] ? may_umount+0xa0/0xa0 [ 270.413389] ? _raw_read_unlock+0x22/0x30 [ 270.417511] ? __get_fs_type+0x8a/0xc0 [ 270.421385] do_mount+0xea4/0x2bb0 [ 270.425008] ? __might_fault+0x110/0x1d0 [ 270.429063] ? copy_mount_string+0x40/0x40 [ 270.433275] ? __check_object_size+0x8b/0x530 [ 270.437759] ? __might_sleep+0x95/0x190 [ 270.441720] ? kasan_check_write+0x14/0x20 [ 270.445931] ? _copy_from_user+0x99/0x110 [ 270.450062] ? memdup_user+0x5e/0x90 [ 270.453752] ? copy_mount_options+0x1f7/0x2e0 [ 270.458232] SyS_mount+0xab/0x120 [ 270.461663] ? copy_mnt_ns+0xb30/0xb30 [ 270.465535] do_syscall_64+0x281/0x940 [ 270.469407] ? __do_page_fault+0xc90/0xc90 [ 270.474053] ? _raw_spin_unlock_irq+0x27/0x70 [ 270.478529] ? finish_task_switch+0x1c1/0x7e0 [ 270.483007] ? syscall_return_slowpath+0x550/0x550 [ 270.487922] ? syscall_return_slowpath+0x2ac/0x550 [ 270.492837] ? prepare_exit_to_usermode+0x350/0x350 [ 270.497831] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 270.503181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.508022] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.513189] RIP: 0033:0x4548b9 [ 270.516357] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.524040] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 270.531282] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 270.538526] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 270.545859] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 270.553102] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2033/05/18 03:34:04 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) setreuid(r1, r1) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='teql0\x00', 0xa400000000000000}) 2033/05/18 03:34:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:04 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:04 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:04 executing program 3 (fault-call:13 fault-nth:16): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:04 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f000004cff3)='/dev/usbmon#\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) read(r4, &(0x7f0000000100)=""/118, 0x76) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000840)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x6, 0xf, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0x8, 0xc, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, @alu={0x7, 0x0, 0x7, 0xa, 0x4, 0x50}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xb9c8}, @call={0x85, 0x0, 0x0, 0x2f}, @exit={0x95}, @exit={0x95}], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x4000000dd4, 0xd6, &(0x7f0000000740)=""/214, 0x41100, 0x1, [], r7}, 0x48) write$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)=@create_id={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffff}, 0x106, 0x1000}}, 0x20) write$rdma_cm(r5, &(0x7f00000009c0)=@bind={0x14, 0x88, 0xfa00, {r8, 0x1c, 0x0, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}}}, 0xfffffffffffffd53) r9 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x89e0, &(0x7f000031aff8)={r0, r6}) ioctl$TIOCLINUX4(r5, 0x541c, &(0x7f0000000280)=0x4) sendmsg$kcm(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) 2033/05/18 03:34:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000000000952ca669dfe25ae154b5352da5b553d5b5dffe005f557f0c8feb2718872040498b3d295eed"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 270.605573] device lo left promiscuous mode [ 270.611908] device lo entered promiscuous mode [ 270.670283] FAULT_INJECTION: forcing a failure. [ 270.670283] name failslab, interval 1, probability 0, space 0, times 0 [ 270.681597] CPU: 0 PID: 32602 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 270.688788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.698222] Call Trace: [ 270.700797] dump_stack+0x194/0x24d [ 270.704412] ? arch_local_irq_restore+0x53/0x53 [ 270.709066] ? __save_stack_trace+0x7e/0xd0 [ 270.713385] should_fail+0x8c0/0xa40 [ 270.717100] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.722197] ? kasan_kmalloc+0xad/0xe0 [ 270.726072] ? kmem_cache_alloc_trace+0x136/0x740 [ 270.730907] ? __memcg_init_list_lru_node+0x169/0x270 [ 270.736097] ? __list_lru_init+0x544/0x750 [ 270.740326] ? sget_userns+0x691/0xe40 [ 270.744203] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 270.748942] ? do_mount+0xea4/0x2bb0 [ 270.752639] ? SyS_mount+0xab/0x120 [ 270.756254] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.761618] ? find_held_lock+0x35/0x1d0 [ 270.765688] ? __lock_is_held+0xb6/0x140 [ 270.769769] ? check_same_owner+0x320/0x320 [ 270.774086] ? rcu_note_context_switch+0x710/0x710 [ 270.779026] should_failslab+0xec/0x120 [ 270.783160] kmem_cache_alloc_trace+0x4b/0x740 [ 270.787727] ? __kmalloc_node+0x33/0x70 [ 270.791680] ? __kmalloc_node+0x33/0x70 [ 270.795637] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.800646] __memcg_init_list_lru_node+0x169/0x270 [ 270.805651] ? list_lru_add+0x7c0/0x7c0 [ 270.809608] ? __kmalloc_node+0x47/0x70 [ 270.813583] __list_lru_init+0x544/0x750 [ 270.817642] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 270.823515] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 270.828522] ? __lockdep_init_map+0xe4/0x650 [ 270.832935] ? lockdep_init_map+0x9/0x10 [ 270.837045] sget_userns+0x691/0xe40 [ 270.840737] ? set_anon_super+0x20/0x20 [ 270.844709] ? put_filp+0x90/0x90 [ 270.848147] ? destroy_unused_super.part.6+0xd0/0xd0 [ 270.853230] ? alloc_vfsmnt+0x762/0x9c0 [ 270.857182] ? path_lookupat+0x238/0xba0 [ 270.861228] ? mnt_free_id.isra.21+0x50/0x50 [ 270.867540] ? trace_hardirqs_off+0x10/0x10 [ 270.871852] ? putname+0xee/0x130 [ 270.875296] ? cap_capable+0x1b5/0x230 [ 270.879177] ? security_capable+0x8e/0xc0 [ 270.883312] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 270.888483] ? ns_capable_common+0xcf/0x160 [ 270.892797] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 270.897965] mount_ns+0x6d/0x190 [ 270.901323] rpc_mount+0x9e/0xd0 [ 270.904680] mount_fs+0x66/0x2d0 [ 270.908127] vfs_kern_mount.part.26+0xc6/0x4a0 [ 270.912694] ? may_umount+0xa0/0xa0 [ 270.916304] ? _raw_read_unlock+0x22/0x30 [ 270.920447] ? __get_fs_type+0x8a/0xc0 [ 270.924419] do_mount+0xea4/0x2bb0 [ 270.927941] ? __might_fault+0x110/0x1d0 [ 270.931999] ? copy_mount_string+0x40/0x40 [ 270.936223] ? __check_object_size+0x8b/0x530 [ 270.940714] ? __might_sleep+0x95/0x190 [ 270.944686] ? kasan_check_write+0x14/0x20 [ 270.948907] ? _copy_from_user+0x99/0x110 [ 270.953050] ? memdup_user+0x5e/0x90 [ 270.956742] ? copy_mount_options+0x1f7/0x2e0 [ 270.961230] SyS_mount+0xab/0x120 [ 270.964671] ? copy_mnt_ns+0xb30/0xb30 [ 270.968550] do_syscall_64+0x281/0x940 [ 270.972413] ? __do_page_fault+0xc90/0xc90 [ 270.976632] ? _raw_spin_unlock_irq+0x27/0x70 [ 270.981109] ? finish_task_switch+0x1c1/0x7e0 [ 270.985589] ? syscall_return_slowpath+0x550/0x550 [ 270.990500] ? syscall_return_slowpath+0x2ac/0x550 [ 270.995411] ? prepare_exit_to_usermode+0x350/0x350 [ 271.000430] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 271.005791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.010632] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 271.015801] RIP: 0033:0x4548b9 2033/05/18 03:34:04 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:04 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 271.018970] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 271.026661] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 271.034013] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 271.041262] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 271.048509] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 271.055754] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2033/05/18 03:34:04 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:04 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x0, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 271.088400] device lo left promiscuous mode [ 271.100143] device lo left promiscuous mode [ 271.106983] device lo entered promiscuous mode [ 271.114478] device lo entered promiscuous mode 2033/05/18 03:34:05 executing program 3 (fault-call:13 fault-nth:17): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f000007d000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) sendmsg(r1, &(0x7f00003f6000)={0x0, 0x0, &(0x7f0000f39fc0)=[{&(0x7f0000c44000)='2', 0x1}], 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r1, r2, &(0x7f000000a000), 0x2) [ 271.158985] device lo left promiscuous mode 2033/05/18 03:34:05 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 271.193584] device lo left promiscuous mode [ 271.239077] FAULT_INJECTION: forcing a failure. [ 271.239077] name failslab, interval 1, probability 0, space 0, times 0 [ 271.250479] CPU: 1 PID: 32635 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 271.257665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.267016] Call Trace: [ 271.269633] dump_stack+0x194/0x24d [ 271.273273] ? arch_local_irq_restore+0x53/0x53 [ 271.277948] ? __save_stack_trace+0x7e/0xd0 [ 271.282293] should_fail+0x8c0/0xa40 [ 271.286016] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.291114] ? kasan_kmalloc+0xad/0xe0 [ 271.294996] ? kmem_cache_alloc_trace+0x136/0x740 [ 271.299833] ? __memcg_init_list_lru_node+0x169/0x270 [ 271.305016] ? __list_lru_init+0x544/0x750 [ 271.309238] ? sget_userns+0x691/0xe40 [ 271.313124] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 271.317871] ? do_mount+0xea4/0x2bb0 [ 271.321585] ? SyS_mount+0xab/0x120 [ 271.325210] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 271.330587] ? find_held_lock+0x35/0x1d0 [ 271.334667] ? __lock_is_held+0xb6/0x140 [ 271.338756] ? check_same_owner+0x320/0x320 [ 271.343083] ? rcu_note_context_switch+0x710/0x710 [ 271.348037] should_failslab+0xec/0x120 [ 271.352013] kmem_cache_alloc_trace+0x4b/0x740 [ 271.356593] ? __kmalloc_node+0x33/0x70 [ 271.360559] ? __kmalloc_node+0x33/0x70 [ 271.364528] ? rcu_read_lock_sched_held+0x108/0x120 [ 271.369553] __memcg_init_list_lru_node+0x169/0x270 [ 271.374575] ? list_lru_add+0x7c0/0x7c0 [ 271.378635] ? __kmalloc_node+0x47/0x70 [ 271.382625] __list_lru_init+0x544/0x750 [ 271.386307] device lo entered promiscuous mode [ 271.386691] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 271.397123] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 271.402144] ? __lockdep_init_map+0xe4/0x650 [ 271.406560] ? lockdep_init_map+0x9/0x10 [ 271.410725] sget_userns+0x691/0xe40 [ 271.414435] ? set_anon_super+0x20/0x20 [ 271.418423] ? put_filp+0x90/0x90 [ 271.421878] ? destroy_unused_super.part.6+0xd0/0xd0 [ 271.427252] ? alloc_vfsmnt+0x762/0x9c0 [ 271.431212] ? path_lookupat+0x238/0xba0 [ 271.435254] ? mnt_free_id.isra.21+0x50/0x50 [ 271.439657] ? trace_hardirqs_off+0x10/0x10 [ 271.443979] ? putname+0xee/0x130 [ 271.447426] ? cap_capable+0x1b5/0x230 [ 271.451308] ? security_capable+0x8e/0xc0 [ 271.455444] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 271.460612] ? ns_capable_common+0xcf/0x160 [ 271.464932] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 271.470101] mount_ns+0x6d/0x190 [ 271.473461] rpc_mount+0x9e/0xd0 [ 271.476816] mount_fs+0x66/0x2d0 [ 271.480173] vfs_kern_mount.part.26+0xc6/0x4a0 [ 271.484752] ? may_umount+0xa0/0xa0 [ 271.489162] ? _raw_read_unlock+0x22/0x30 [ 271.493295] ? __get_fs_type+0x8a/0xc0 [ 271.497265] do_mount+0xea4/0x2bb0 [ 271.500782] ? __might_fault+0x110/0x1d0 [ 271.504838] ? copy_mount_string+0x40/0x40 [ 271.509062] ? __check_object_size+0x8b/0x530 [ 271.513558] ? __might_sleep+0x95/0x190 [ 271.517531] ? kasan_check_write+0x14/0x20 [ 271.521753] ? _copy_from_user+0x99/0x110 [ 271.525893] ? memdup_user+0x5e/0x90 [ 271.529584] ? copy_mount_options+0x1f7/0x2e0 [ 271.534071] SyS_mount+0xab/0x120 [ 271.537502] ? copy_mnt_ns+0xb30/0xb30 [ 271.541379] do_syscall_64+0x281/0x940 [ 271.545244] ? __do_page_fault+0xc90/0xc90 [ 271.549461] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 271.554983] ? syscall_return_slowpath+0x550/0x550 [ 271.559898] ? syscall_return_slowpath+0x2ac/0x550 [ 271.564818] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 271.570174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.575024] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 271.580195] RIP: 0033:0x4548b9 [ 271.583367] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 271.591141] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 271.598389] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 271.605636] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 271.612884] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 271.620132] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 [ 271.629101] device lo entered promiscuous mode 2033/05/18 03:34:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x0, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x47}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x2, &(0x7f0000346fc8)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000000040)=""/251}, 0x48) 2033/05/18 03:34:05 executing program 3 (fault-call:13 fault-nth:18): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x4000040, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:05 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18fbffffff0000000045a511307ab4000000100000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:05 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x401, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000754000/0x3000)=nil, 0x3000}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) wait4(r1, &(0x7f0000000100), 0x80000005, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x3, &(0x7f0000c87000/0x2000)=nil) setxattr(&(0x7f0000c7e000)='..', &(0x7f00004a0fef)=@known='security.selinux\x00', &(0x7f000059afd5)="73797374656d5f753a6f626a6563745f722273797374656d5f64627573645f7661725f6c69625f74887330", 0x2b, 0x0) 2033/05/18 03:34:05 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:05 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f00000019c0)="60167b6fcc253f59e3d3dd7274e940d81621dbdef3e519d9d3e117edddc3a40aa004668bacd0bf93019e9fa5131378c1377490d306532e8a324ba89ed1a99f5338d9240c554840ae71cab8f321bf8dc9181467fd6b35c95e882f73ce67492af5071ec00398bdc4c1fdd64e7c2a9f57a1977223d14815afa4bf", 0x79) r3 = dup3(r2, r0, 0x80000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000080)={0x100000000006, r0, 0xfffffffffffffffe}) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=ANY=[], 0x1023c) truncate(&(0x7f0000000140)='./file0\x00', 0x0) write(r5, &(0x7f0000000180)="15", 0x1) r6 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) fallocate(r6, 0x0, 0xffff, 0x9) close(r5) open(&(0x7f0000000100)='./file0\x00', 0x200, 0x80) r7 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40100, 0x5) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000040)=0x8, 0x4) execveat(r4, &(0x7f0000000000)='./file0\x00', &(0x7f0000001680)=[&(0x7f0000000300)='user#-)hnodev[GPL+vboxnet0\'\\^cgroup\x00', &(0x7f0000000340)='{nodev[\x00', &(0x7f00000014c0)='/dev/loop-control\x00', &(0x7f0000001500)='/dev/vcs\x00', &(0x7f0000001540)='/dev/loop-control\x00', &(0x7f0000001580)='/dev/vcs\x00', &(0x7f00000015c0)='GPL^user\x00', &(0x7f0000001600)="296574683076626f786e657431776c616e31298f2c63707573657440766d6e657431706f7369785f61636c5f616363657373766d6e657430", &(0x7f0000001640)='/dev/loop-control\x00'], &(0x7f0000001940)=[&(0x7f0000001700)='^\x00', &(0x7f0000001740)='/dev/kvm\x00', &(0x7f0000001780)='eth1@ppp1\x00', &(0x7f00000017c0)=')@}\x00', &(0x7f0000001800)='/dev/kvm\x00', &(0x7f0000001840)='/dev/kvm\x00', &(0x7f0000001880)='/dev/kvm\x00', &(0x7f00000018c0)='selinuxeth1/keyring\'\x00', &(0x7f0000001900)='\x00'], 0x1000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}, 0x400}}, 0x5, 0xfffffffeffffffff}, &(0x7f0000000440)=0x90) r8 = dup2(r0, r0) bind$ipx(r8, &(0x7f0000000280)={0x4, 0x0, 0x80, "34c1b884fbec", 0x81}, 0x10) connect$ax25(r8, &(0x7f00000002c0)={0x3, {"20ada8787a1d43"}}, 0x10) getsockopt$sock_buf(r8, 0x1, 0x3f, &(0x7f0000000480)=""/4096, &(0x7f0000001480)=0x1000) [ 271.723622] device lo left promiscuous mode [ 271.734674] FAULT_INJECTION: forcing a failure. [ 271.734674] name failslab, interval 1, probability 0, space 0, times 0 [ 271.746071] CPU: 1 PID: 32652 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 271.753256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.762604] Call Trace: [ 271.765190] dump_stack+0x194/0x24d [ 271.768828] ? arch_local_irq_restore+0x53/0x53 2033/05/18 03:34:05 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 271.773500] ? __save_stack_trace+0x7e/0xd0 [ 271.777841] should_fail+0x8c0/0xa40 [ 271.781566] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.786669] ? kasan_kmalloc+0xad/0xe0 [ 271.790555] ? kmem_cache_alloc_trace+0x136/0x740 [ 271.795402] ? __memcg_init_list_lru_node+0x169/0x270 [ 271.800587] ? __list_lru_init+0x544/0x750 [ 271.804810] ? sget_userns+0x691/0xe40 [ 271.808688] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 271.813424] ? do_mount+0xea4/0x2bb0 [ 271.817131] ? SyS_mount+0xab/0x120 [ 271.820751] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 271.826124] ? find_held_lock+0x35/0x1d0 [ 271.830203] ? __lock_is_held+0xb6/0x140 [ 271.834273] ? check_same_owner+0x320/0x320 [ 271.838585] ? rcu_note_context_switch+0x710/0x710 [ 271.843505] should_failslab+0xec/0x120 [ 271.847459] kmem_cache_alloc_trace+0x4b/0x740 [ 271.852022] ? __kmalloc_node+0x33/0x70 [ 271.855972] ? __kmalloc_node+0x33/0x70 [ 271.859924] ? rcu_read_lock_sched_held+0x108/0x120 [ 271.864933] __memcg_init_list_lru_node+0x169/0x270 [ 271.869938] ? list_lru_add+0x7c0/0x7c0 [ 271.873899] ? __kmalloc_node+0x47/0x70 [ 271.877861] __list_lru_init+0x544/0x750 [ 271.881906] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 271.887768] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 271.892766] ? __lockdep_init_map+0xe4/0x650 [ 271.897154] ? lockdep_init_map+0x9/0x10 [ 271.901196] sget_userns+0x691/0xe40 [ 271.904884] ? set_anon_super+0x20/0x20 [ 271.908844] ? put_filp+0x90/0x90 [ 271.912276] ? destroy_unused_super.part.6+0xd0/0xd0 [ 271.917357] ? alloc_vfsmnt+0x762/0x9c0 [ 271.921308] ? path_lookupat+0x238/0xba0 [ 271.925360] ? mnt_free_id.isra.21+0x50/0x50 [ 271.929751] ? trace_hardirqs_off+0x10/0x10 [ 271.934052] ? putname+0xee/0x130 [ 271.937485] ? cap_capable+0x1b5/0x230 [ 271.941356] ? security_capable+0x8e/0xc0 [ 271.945489] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 271.950653] ? ns_capable_common+0xcf/0x160 [ 271.954956] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 271.960122] mount_ns+0x6d/0x190 [ 271.963469] rpc_mount+0x9e/0xd0 [ 271.966816] mount_fs+0x66/0x2d0 [ 271.970167] vfs_kern_mount.part.26+0xc6/0x4a0 [ 271.974730] ? may_umount+0xa0/0xa0 [ 271.978336] ? _raw_read_unlock+0x22/0x30 [ 271.982458] ? __get_fs_type+0x8a/0xc0 [ 271.986335] do_mount+0xea4/0x2bb0 [ 271.989849] ? __might_fault+0x110/0x1d0 [ 271.993897] ? copy_mount_string+0x40/0x40 [ 271.998108] ? __check_object_size+0x8b/0x530 [ 272.002588] ? __might_sleep+0x95/0x190 [ 272.006551] ? kasan_check_write+0x14/0x20 [ 272.010761] ? _copy_from_user+0x99/0x110 [ 272.014889] ? memdup_user+0x5e/0x90 [ 272.018578] ? copy_mount_options+0x1f7/0x2e0 [ 272.023144] SyS_mount+0xab/0x120 [ 272.026583] ? copy_mnt_ns+0xb30/0xb30 [ 272.030459] do_syscall_64+0x281/0x940 [ 272.034336] ? __do_page_fault+0xc90/0xc90 [ 272.038545] ? _raw_spin_unlock_irq+0x27/0x70 [ 272.043023] ? finish_task_switch+0x1c1/0x7e0 [ 272.047496] ? syscall_return_slowpath+0x550/0x550 [ 272.052405] ? syscall_return_slowpath+0x2ac/0x550 [ 272.057313] ? prepare_exit_to_usermode+0x350/0x350 [ 272.062309] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 272.067658] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.072486] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.077652] RIP: 0033:0x4548b9 [ 272.080816] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 272.088503] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 272.095747] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 272.102992] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 272.110589] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 272.117836] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2033/05/18 03:34:06 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x0, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 272.125848] device lo left promiscuous mode [ 272.132159] device lo entered promiscuous mode [ 272.139436] device lo entered promiscuous mode 2033/05/18 03:34:06 executing program 3 (fault-call:13 fault-nth:19): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 272.182603] device lo left promiscuous mode 2033/05/18 03:34:06 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 272.231775] device lo left promiscuous mode [ 272.266695] FAULT_INJECTION: forcing a failure. [ 272.266695] name failslab, interval 1, probability 0, space 0, times 0 [ 272.278005] CPU: 0 PID: 32682 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 272.285188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.294536] Call Trace: [ 272.297127] dump_stack+0x194/0x24d [ 272.300764] ? arch_local_irq_restore+0x53/0x53 [ 272.305436] ? __save_stack_trace+0x7e/0xd0 [ 272.309762] should_fail+0x8c0/0xa40 [ 272.313469] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.318558] ? kasan_kmalloc+0xad/0xe0 [ 272.322421] ? kmem_cache_alloc_trace+0x136/0x740 [ 272.327240] ? __memcg_init_list_lru_node+0x169/0x270 [ 272.332406] ? __list_lru_init+0x544/0x750 [ 272.336621] ? sget_userns+0x691/0xe40 [ 272.340497] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 272.345234] ? do_mount+0xea4/0x2bb0 [ 272.348922] ? SyS_mount+0xab/0x120 [ 272.352533] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.357885] ? find_held_lock+0x35/0x1d0 [ 272.361928] ? __lock_is_held+0xb6/0x140 [ 272.365980] ? check_same_owner+0x320/0x320 [ 272.370290] ? rcu_note_context_switch+0x710/0x710 [ 272.375220] should_failslab+0xec/0x120 [ 272.379181] kmem_cache_alloc_trace+0x4b/0x740 [ 272.383741] ? __kmalloc_node+0x33/0x70 [ 272.387689] ? __kmalloc_node+0x33/0x70 [ 272.391656] ? rcu_read_lock_sched_held+0x108/0x120 [ 272.396661] __memcg_init_list_lru_node+0x169/0x270 [ 272.401670] ? list_lru_add+0x7c0/0x7c0 [ 272.405641] ? __kmalloc_node+0x47/0x70 [ 272.409619] __list_lru_init+0x544/0x750 2033/05/18 03:34:06 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000280)=0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 272.412410] device lo entered promiscuous mode [ 272.413684] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 272.413700] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 272.413716] ? __lockdep_init_map+0xe4/0x650 [ 272.433544] ? lockdep_init_map+0x9/0x10 [ 272.437612] sget_userns+0x691/0xe40 [ 272.441328] ? set_anon_super+0x20/0x20 [ 272.445316] ? put_filp+0x90/0x90 [ 272.448768] ? destroy_unused_super.part.6+0xd0/0xd0 [ 272.453858] ? alloc_vfsmnt+0x762/0x9c0 [ 272.457815] ? path_lookupat+0x238/0xba0 [ 272.461858] ? mnt_free_id.isra.21+0x50/0x50 [ 272.466964] ? trace_hardirqs_off+0x10/0x10 [ 272.471275] ? putname+0xee/0x130 [ 272.474722] ? cap_capable+0x1b5/0x230 [ 272.478610] ? security_capable+0x8e/0xc0 [ 272.482750] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 272.487921] ? ns_capable_common+0xcf/0x160 [ 272.492231] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 272.497401] mount_ns+0x6d/0x190 [ 272.500760] rpc_mount+0x9e/0xd0 [ 272.504130] mount_fs+0x66/0x2d0 [ 272.507581] vfs_kern_mount.part.26+0xc6/0x4a0 [ 272.512159] ? may_umount+0xa0/0xa0 [ 272.515766] ? _raw_read_unlock+0x22/0x30 [ 272.519894] ? __get_fs_type+0x8a/0xc0 [ 272.523776] do_mount+0xea4/0x2bb0 [ 272.527301] ? __might_fault+0x110/0x1d0 [ 272.531450] ? copy_mount_string+0x40/0x40 [ 272.535668] ? __check_object_size+0x8b/0x530 [ 272.540161] ? __might_sleep+0x95/0x190 [ 272.544131] ? kasan_check_write+0x14/0x20 [ 272.548344] ? _copy_from_user+0x99/0x110 [ 272.552480] ? memdup_user+0x5e/0x90 [ 272.556181] ? copy_mount_options+0x1f7/0x2e0 [ 272.560667] SyS_mount+0xab/0x120 [ 272.564099] ? copy_mnt_ns+0xb30/0xb30 [ 272.567972] do_syscall_64+0x281/0x940 [ 272.571837] ? __do_page_fault+0xc90/0xc90 [ 272.576330] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 272.581851] ? syscall_return_slowpath+0x550/0x550 [ 272.586762] ? syscall_return_slowpath+0x2ac/0x550 [ 272.591682] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 272.597037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.601873] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.607046] RIP: 0033:0x4548b9 [ 272.610215] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 272.617998] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 272.625337] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 272.632593] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 272.639839] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 272.647109] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 [ 272.691968] device lo entered promiscuous mode 2033/05/18 03:34:06 executing program 3 (fault-call:13 fault-nth:20): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:06 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e21, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x57) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:06 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 272.722985] device lo left promiscuous mode [ 272.729169] device lo entered promiscuous mode 2033/05/18 03:34:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003001101e526b5d32b3c00000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:06 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:06 executing program 2: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000000)={0x0, 0x7e0e577dc712495c, 0xffffffffffffff9c}) open_by_handle_at(r0, &(0x7f0000000100)={0x7d, 0x6, "1efbd050c021c408d1f84b33fc93e0cf77266a9f50345485691a586f31ec6df8e604090c2f035ca9c4e42432b664de7c5d5c390f9aad172237d96b6392254a102bfe8ae7701545cdb0928a1691da69042522c43818d48a04f8fc32a6a5a740a52299955cf3fbf3be3c7bfca928076f29fcec6721ab"}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r1, &(0x7f00000000c0)={0x1f}, 0xe) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040), 0x4) 2033/05/18 03:34:06 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 272.809598] device lo left promiscuous mode [ 272.811248] FAULT_INJECTION: forcing a failure. [ 272.811248] name failslab, interval 1, probability 0, space 0, times 0 [ 272.825470] CPU: 1 PID: 32701 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 272.825993] device lo entered promiscuous mode [ 272.832653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.832659] Call Trace: [ 272.832677] dump_stack+0x194/0x24d [ 272.832697] ? arch_local_irq_restore+0x53/0x53 [ 272.832712] ? mutex_lock_io_nested+0x1900/0x1900 [ 272.832742] should_fail+0x8c0/0xa40 [ 272.866003] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.871097] ? trace_hardirqs_off+0x10/0x10 [ 272.875399] ? lock_downgrade+0x980/0x980 [ 272.879531] ? trace_hardirqs_off+0x10/0x10 [ 272.883838] ? find_held_lock+0x35/0x1d0 [ 272.887902] ? __lock_is_held+0xb6/0x140 [ 272.891985] ? check_same_owner+0x320/0x320 [ 272.896289] ? rcu_note_context_switch+0x710/0x710 [ 272.901201] ? rcu_note_context_switch+0x710/0x710 [ 272.906120] should_failslab+0xec/0x120 [ 272.910074] __kmalloc+0x63/0x760 [ 272.913607] ? __kmalloc_node+0x47/0x70 [ 272.917561] ? __list_lru_init+0xcf/0x750 [ 272.921695] __list_lru_init+0xcf/0x750 [ 272.925656] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 272.931524] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 272.936526] ? lockdep_init_map+0x9/0x10 [ 272.940571] sget_userns+0x6b1/0xe40 [ 272.944267] ? set_anon_super+0x20/0x20 [ 272.948225] ? put_filp+0x90/0x90 [ 272.951663] ? destroy_unused_super.part.6+0xd0/0xd0 [ 272.956752] ? alloc_vfsmnt+0x762/0x9c0 [ 272.960709] ? path_lookupat+0x238/0xba0 [ 272.964755] ? mnt_free_id.isra.21+0x50/0x50 [ 272.969149] ? trace_hardirqs_off+0x10/0x10 [ 272.973460] ? putname+0xee/0x130 [ 272.976897] ? cap_capable+0x1b5/0x230 [ 272.980775] ? security_capable+0x8e/0xc0 [ 272.984906] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 272.990074] ? ns_capable_common+0xcf/0x160 [ 272.994379] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 272.999546] mount_ns+0x6d/0x190 [ 273.002897] rpc_mount+0x9e/0xd0 [ 273.006248] mount_fs+0x66/0x2d0 [ 273.009601] vfs_kern_mount.part.26+0xc6/0x4a0 [ 273.014165] ? may_umount+0xa0/0xa0 [ 273.017779] ? _raw_read_unlock+0x22/0x30 [ 273.021905] ? __get_fs_type+0x8a/0xc0 [ 273.025867] do_mount+0xea4/0x2bb0 [ 273.029385] ? __might_fault+0x110/0x1d0 [ 273.033440] ? copy_mount_string+0x40/0x40 [ 273.037657] ? __check_object_size+0x8b/0x530 [ 273.042142] ? __might_sleep+0x95/0x190 [ 273.046106] ? kasan_check_write+0x14/0x20 [ 273.050327] ? _copy_from_user+0x99/0x110 [ 273.054458] ? memdup_user+0x5e/0x90 [ 273.058151] ? copy_mount_options+0x1f7/0x2e0 [ 273.062649] SyS_mount+0xab/0x120 [ 273.066082] ? copy_mnt_ns+0xb30/0xb30 [ 273.070128] do_syscall_64+0x281/0x940 [ 273.073994] ? __do_page_fault+0xc90/0xc90 [ 273.078213] ? _raw_spin_unlock_irq+0x27/0x70 [ 273.082694] ? finish_task_switch+0x1c1/0x7e0 [ 273.087170] ? syscall_return_slowpath+0x550/0x550 [ 273.092077] ? syscall_return_slowpath+0x2ac/0x550 [ 273.096999] ? prepare_exit_to_usermode+0x350/0x350 [ 273.102008] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 273.107364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.112195] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.117363] RIP: 0033:0x4548b9 [ 273.120544] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.128230] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 273.135488] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 273.142736] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 273.149981] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 273.157229] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 273.179098] device lo left promiscuous mode [ 273.188310] device lo entered promiscuous mode 2033/05/18 03:34:07 executing program 2: r0 = userfaultfd(0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) accept4$llc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000949fe8)={0xaa}) r2 = memfd_create(&(0x7f000003affa)="706f73fb00000000000000566f6573737b0000", 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000240)={0x7c9b, 0x6b96, 0x3f, 'queue1\x00', 0x10000}) pwrite64(r2, &(0x7f0000000200)="ab", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000000000)={&(0x7f0000011000/0x3000)=nil, 0x3000}) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000100)=0x4d) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)=0x0) r4 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmat(r4, &(0x7f0000ffb000/0x4000)=nil, 0x4000) migrate_pages(r3, 0x4, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x6) 2033/05/18 03:34:07 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 3 (fault-call:13 fault-nth:21): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r2, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r2, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r1, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x1000}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r7, 0x4}, 0x8) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:07 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'eql\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f00000001c0)=0x40b, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 273.220064] device lo left promiscuous mode [ 273.226261] device lo entered promiscuous mode [ 273.235299] device lo left promiscuous mode [ 273.241698] device lo entered promiscuous mode [ 273.300693] FAULT_INJECTION: forcing a failure. [ 273.300693] name failslab, interval 1, probability 0, space 0, times 0 [ 273.312054] CPU: 1 PID: 32730 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 273.319240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.328592] Call Trace: [ 273.331190] dump_stack+0x194/0x24d [ 273.334830] ? arch_local_irq_restore+0x53/0x53 [ 273.339510] ? rcutorture_record_progress+0x10/0x10 [ 273.344534] should_fail+0x8c0/0xa40 [ 273.348234] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.353314] ? __kernel_text_address+0xd/0x40 [ 273.357792] ? unwind_get_return_address+0x61/0xa0 [ 273.362723] ? find_held_lock+0x35/0x1d0 [ 273.366771] ? __lock_is_held+0xb6/0x140 [ 273.370828] ? check_same_owner+0x320/0x320 [ 273.375134] ? rcu_note_context_switch+0x710/0x710 [ 273.380053] should_failslab+0xec/0x120 [ 273.384013] kmem_cache_alloc_trace+0x4b/0x740 [ 273.388574] ? __kmalloc_node+0x33/0x70 [ 273.392525] ? __kmalloc_node+0x33/0x70 [ 273.396479] ? rcu_read_lock_sched_held+0x108/0x120 [ 273.401490] __memcg_init_list_lru_node+0x169/0x270 [ 273.406490] ? list_lru_add+0x7c0/0x7c0 [ 273.410443] ? __kmalloc_node+0x47/0x70 [ 273.414405] __list_lru_init+0x544/0x750 [ 273.418452] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 273.424314] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 273.429317] ? lockdep_init_map+0x9/0x10 [ 273.433361] sget_userns+0x6b1/0xe40 [ 273.437050] ? set_anon_super+0x20/0x20 [ 273.441013] ? put_filp+0x90/0x90 [ 273.444449] ? destroy_unused_super.part.6+0xd0/0xd0 [ 273.449530] ? alloc_vfsmnt+0x762/0x9c0 [ 273.453480] ? path_lookupat+0x238/0xba0 [ 273.457517] ? mnt_free_id.isra.21+0x50/0x50 [ 273.461908] ? trace_hardirqs_off+0x10/0x10 [ 273.466213] ? putname+0xee/0x130 [ 273.469657] ? cap_capable+0x1b5/0x230 [ 273.473528] ? security_capable+0x8e/0xc0 [ 273.477659] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 273.482840] ? ns_capable_common+0xcf/0x160 [ 273.487895] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 273.493064] mount_ns+0x6d/0x190 [ 273.496422] rpc_mount+0x9e/0xd0 [ 273.499773] mount_fs+0x66/0x2d0 [ 273.503126] vfs_kern_mount.part.26+0xc6/0x4a0 [ 273.507707] ? may_umount+0xa0/0xa0 [ 273.511311] ? _raw_read_unlock+0x22/0x30 [ 273.515436] ? __get_fs_type+0x8a/0xc0 [ 273.519309] do_mount+0xea4/0x2bb0 [ 273.522824] ? __might_fault+0x110/0x1d0 [ 273.526872] ? copy_mount_string+0x40/0x40 [ 273.531086] ? check_same_owner+0x320/0x320 [ 273.535384] ? __check_object_size+0x8b/0x530 [ 273.539868] ? __might_sleep+0x95/0x190 [ 273.543830] ? kasan_check_write+0x14/0x20 [ 273.548042] ? _copy_from_user+0x99/0x110 [ 273.552707] ? memdup_user+0x5e/0x90 [ 273.556398] ? copy_mount_options+0x1f7/0x2e0 [ 273.560876] SyS_mount+0xab/0x120 [ 273.564304] ? copy_mnt_ns+0xb30/0xb30 [ 273.568172] do_syscall_64+0x281/0x940 [ 273.572039] ? __do_page_fault+0xc90/0xc90 [ 273.576345] ? _raw_spin_unlock_irq+0x27/0x70 [ 273.580821] ? finish_task_switch+0x1c1/0x7e0 [ 273.585297] ? syscall_return_slowpath+0x550/0x550 [ 273.590205] ? syscall_return_slowpath+0x2ac/0x550 [ 273.595113] ? prepare_exit_to_usermode+0x350/0x350 [ 273.600106] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 273.605452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.610281] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.615446] RIP: 0033:0x4548b9 [ 273.618614] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.626300] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 273.633549] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 273.640798] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2033/05/18 03:34:07 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 3 (fault-call:13 fault-nth:22): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:07 executing program 2: syz_emit_ethernet(0x6e, &(0x7f00000001c0)=ANY=[@ANYBLOB="cd390b081bf2ffffffffffff86dd6002290f00383a0000007500000000000000ffffe0000001ff0200000000000000000000000000010200907800000000609433df00003d00ff02000052dc8874aa612f53acfd3e8ea9d1b5000000000000000000000001fe800000000000000000000000000000802a08000000006bfbe980e6e0e2da40cc501b131e41223c32f28ecef34b73777179da79869ea854fa12df312be4f6cb24678a648ccc5511e556a70e1ba3b38d4e87c52c9b9dfb87475cefcb594570c45991e7b61fd59ecd49fa514fb8fabc656ea8a6587279b236a200"], 0x0) [ 273.648043] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 273.655288] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 273.679899] device lo left promiscuous mode [ 273.695490] device lo entered promiscuous mode [ 273.762314] device lo left promiscuous mode [ 273.768529] FAULT_INJECTION: forcing a failure. [ 273.768529] name failslab, interval 1, probability 0, space 0, times 0 [ 273.775634] device lo entered promiscuous mode [ 273.779831] CPU: 0 PID: 32755 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 273.791542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.800885] Call Trace: [ 273.803460] dump_stack+0x194/0x24d [ 273.807073] ? arch_local_irq_restore+0x53/0x53 [ 273.811735] should_fail+0x8c0/0xa40 [ 273.815432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.820513] ? __kernel_text_address+0xd/0x40 [ 273.825001] ? unwind_get_return_address+0x61/0xa0 [ 273.829936] ? find_held_lock+0x35/0x1d0 [ 273.833987] ? __lock_is_held+0xb6/0x140 [ 273.838052] ? check_same_owner+0x320/0x320 [ 273.842353] ? rcu_note_context_switch+0x710/0x710 [ 273.847281] should_failslab+0xec/0x120 [ 273.851235] kmem_cache_alloc_trace+0x4b/0x740 [ 273.855799] ? __kmalloc_node+0x33/0x70 [ 273.859748] ? __kmalloc_node+0x33/0x70 [ 273.863701] ? rcu_read_lock_sched_held+0x108/0x120 [ 273.868705] __memcg_init_list_lru_node+0x169/0x270 [ 273.873704] ? list_lru_add+0x7c0/0x7c0 [ 273.877656] ? __kmalloc_node+0x47/0x70 [ 273.881619] __list_lru_init+0x544/0x750 [ 273.885668] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 273.891536] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 273.896538] ? lockdep_init_map+0x9/0x10 [ 273.900580] sget_userns+0x6b1/0xe40 [ 273.904273] ? set_anon_super+0x20/0x20 [ 273.908231] ? put_filp+0x90/0x90 [ 273.911667] ? destroy_unused_super.part.6+0xd0/0xd0 [ 273.916747] ? alloc_vfsmnt+0x762/0x9c0 [ 273.920698] ? path_lookupat+0x238/0xba0 [ 273.924737] ? mnt_free_id.isra.21+0x50/0x50 [ 273.929131] ? trace_hardirqs_off+0x10/0x10 [ 273.933437] ? putname+0xee/0x130 [ 273.936872] ? cap_capable+0x1b5/0x230 [ 273.940748] ? security_capable+0x8e/0xc0 [ 273.944880] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 273.950046] ? ns_capable_common+0xcf/0x160 [ 273.954350] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 273.959518] mount_ns+0x6d/0x190 [ 273.962867] rpc_mount+0x9e/0xd0 [ 273.966218] mount_fs+0x66/0x2d0 [ 273.969570] vfs_kern_mount.part.26+0xc6/0x4a0 [ 273.974151] ? may_umount+0xa0/0xa0 [ 273.977850] ? _raw_read_unlock+0x22/0x30 [ 273.981980] ? __get_fs_type+0x8a/0xc0 [ 273.985854] do_mount+0xea4/0x2bb0 [ 273.989372] ? __might_fault+0x110/0x1d0 [ 273.993421] ? copy_mount_string+0x40/0x40 [ 273.997635] ? __check_object_size+0x8b/0x530 [ 274.002120] ? __might_sleep+0x95/0x190 [ 274.006080] ? kasan_check_write+0x14/0x20 [ 274.010292] ? _copy_from_user+0x99/0x110 [ 274.014423] ? memdup_user+0x5e/0x90 [ 274.018113] ? copy_mount_options+0x1f7/0x2e0 [ 274.022590] SyS_mount+0xab/0x120 [ 274.026026] ? copy_mnt_ns+0xb30/0xb30 [ 274.029897] do_syscall_64+0x281/0x940 [ 274.033760] ? __do_page_fault+0xc90/0xc90 [ 274.037972] ? _raw_spin_unlock_irq+0x27/0x70 [ 274.042462] ? finish_task_switch+0x1c1/0x7e0 [ 274.046938] ? syscall_return_slowpath+0x550/0x550 [ 274.052024] ? syscall_return_slowpath+0x2ac/0x550 [ 274.056932] ? prepare_exit_to_usermode+0x350/0x350 [ 274.061926] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 274.067276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.072105] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.077272] RIP: 0033:0x4548b9 [ 274.080438] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 274.088123] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 274.095368] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 274.102615] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2033/05/18 03:34:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='net/xfrm_stat\x00') mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x20000000000000, &(0x7f0000000180)) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000140)) 2033/05/18 03:34:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0xffffffffffffffcf) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) r3 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x10001, 0x20340) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000004c0)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) sync() r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800e607000023001698e89fc36ce887ed3d930eeaddba4779d7cd2f01c97780ccff5b80b7145037683584e0c4ada6d017bfeb57a9d9ed17ce48dd4130f20aa22aa563792d1f7257a190d750dd2a9f3c9d9b32d7324bcba7ff6e1c99dead3d6ec1348c36faabb8b278938eac318d8f906752d12082163012f884f08b2796a49c47b2edaf853dda8a55bcda5a9208b58f7da5b0edc9f3c89315118016811d5152b02c4c17498e29b90541b8cc3a2953c4f61ef4420efd7d072e4a068e404eac8c88f47aa3ae7ce729220d24149be863cca7c2779c5577133dccd7ce6defb3f93d2ce418fcb06b929c8ba990c7b2f93a9c7b395e3c2f45"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:08 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 274.109859] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 274.117104] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2033/05/18 03:34:08 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0x0, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 3 (fault-call:13 fault-nth:23): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 274.190238] device lo left promiscuous mode [ 274.231327] device lo entered promiscuous mode [ 274.252955] FAULT_INJECTION: forcing a failure. [ 274.252955] name failslab, interval 1, probability 0, space 0, times 0 [ 274.264674] CPU: 0 PID: 303 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 274.271793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.281144] Call Trace: [ 274.283722] dump_stack+0x194/0x24d [ 274.287333] ? arch_local_irq_restore+0x53/0x53 [ 274.291984] ? __save_stack_trace+0x7e/0xd0 [ 274.296303] should_fail+0x8c0/0xa40 [ 274.300021] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.305105] ? kasan_kmalloc+0xad/0xe0 [ 274.308969] ? kmem_cache_alloc_trace+0x136/0x740 [ 274.313787] ? __memcg_init_list_lru_node+0x169/0x270 [ 274.318951] ? __list_lru_init+0x544/0x750 [ 274.323162] ? sget_userns+0x6b1/0xe40 [ 274.327035] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 274.331766] ? do_mount+0xea4/0x2bb0 [ 274.335454] ? SyS_mount+0xab/0x120 [ 274.339059] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.344413] ? find_held_lock+0x35/0x1d0 [ 274.348478] ? __lock_is_held+0xb6/0x140 [ 274.352538] ? check_same_owner+0x320/0x320 [ 274.356842] ? rcu_note_context_switch+0x710/0x710 [ 274.361759] should_failslab+0xec/0x120 [ 274.365715] kmem_cache_alloc_trace+0x4b/0x740 [ 274.370275] ? __kmalloc_node+0x33/0x70 [ 274.374223] ? __kmalloc_node+0x33/0x70 [ 274.378174] ? rcu_read_lock_sched_held+0x108/0x120 [ 274.383179] __memcg_init_list_lru_node+0x169/0x270 [ 274.388180] ? list_lru_add+0x7c0/0x7c0 [ 274.392137] ? __kmalloc_node+0x47/0x70 [ 274.396112] __list_lru_init+0x544/0x750 [ 274.400174] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 274.406037] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 274.411049] ? lockdep_init_map+0x9/0x10 [ 274.415095] sget_userns+0x6b1/0xe40 [ 274.418792] ? set_anon_super+0x20/0x20 [ 274.422751] ? put_filp+0x90/0x90 [ 274.426185] ? destroy_unused_super.part.6+0xd0/0xd0 [ 274.431265] ? alloc_vfsmnt+0x762/0x9c0 [ 274.435217] ? path_lookupat+0x238/0xba0 [ 274.439254] ? mnt_free_id.isra.21+0x50/0x50 [ 274.443645] ? trace_hardirqs_off+0x10/0x10 [ 274.447948] ? putname+0xee/0x130 [ 274.451384] ? cap_capable+0x1b5/0x230 [ 274.455260] ? security_capable+0x8e/0xc0 [ 274.459395] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 274.464560] ? ns_capable_common+0xcf/0x160 [ 274.468864] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 274.474031] mount_ns+0x6d/0x190 [ 274.477383] rpc_mount+0x9e/0xd0 [ 274.480732] mount_fs+0x66/0x2d0 [ 274.484082] vfs_kern_mount.part.26+0xc6/0x4a0 [ 274.488648] ? may_umount+0xa0/0xa0 [ 274.492251] ? _raw_read_unlock+0x22/0x30 [ 274.496375] ? __get_fs_type+0x8a/0xc0 [ 274.500253] do_mount+0xea4/0x2bb0 [ 274.503767] ? __might_fault+0x110/0x1d0 [ 274.507814] ? copy_mount_string+0x40/0x40 [ 274.512030] ? __check_object_size+0x8b/0x530 [ 274.516528] ? __might_sleep+0x95/0x190 [ 274.520489] ? kasan_check_write+0x14/0x20 [ 274.524703] ? _copy_from_user+0x99/0x110 [ 274.528836] ? memdup_user+0x5e/0x90 [ 274.532528] ? copy_mount_options+0x1f7/0x2e0 [ 274.537020] SyS_mount+0xab/0x120 [ 274.540454] ? copy_mnt_ns+0xb30/0xb30 [ 274.544321] do_syscall_64+0x281/0x940 [ 274.548186] ? __do_page_fault+0xc90/0xc90 [ 274.552398] ? _raw_spin_unlock_irq+0x27/0x70 [ 274.556872] ? finish_task_switch+0x1c1/0x7e0 [ 274.561345] ? syscall_return_slowpath+0x550/0x550 [ 274.566253] ? syscall_return_slowpath+0x2ac/0x550 [ 274.571167] ? prepare_exit_to_usermode+0x350/0x350 [ 274.576164] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 274.581512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.586341] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.591517] RIP: 0033:0x4548b9 [ 274.594685] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 274.602370] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 274.609619] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 274.616870] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 274.624120] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 274.631368] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2033/05/18 03:34:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280), &(0x7f00000002c0)=0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x41, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000140)=""/162) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f00000000c0)={'irlan0\x00', {0x2, 0x4e24, @rand_addr=0xfb}}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000000)) [ 274.673439] device lo left promiscuous mode [ 274.679830] device lo entered promiscuous mode 2033/05/18 03:34:08 executing program 3 (fault-call:13 fault-nth:24): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="5800000003000000000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) getsockname$packet(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000280)=0x14) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r1}) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0x0, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:08 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="b5a72b211800000000000000000000000000000095000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 274.764668] FAULT_INJECTION: forcing a failure. [ 274.764668] name failslab, interval 1, probability 0, space 0, times 0 [ 274.776040] CPU: 1 PID: 319 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 274.783049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.792383] Call Trace: [ 274.794954] dump_stack+0x194/0x24d [ 274.798570] ? arch_local_irq_restore+0x53/0x53 [ 274.803231] ? __save_stack_trace+0x7e/0xd0 [ 274.807544] should_fail+0x8c0/0xa40 [ 274.811242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.816323] ? kasan_kmalloc+0xad/0xe0 [ 274.820187] ? kmem_cache_alloc_trace+0x136/0x740 [ 274.825012] ? __memcg_init_list_lru_node+0x169/0x270 [ 274.830178] ? __list_lru_init+0x544/0x750 [ 274.834390] ? sget_userns+0x6b1/0xe40 [ 274.838260] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 274.842990] ? do_mount+0xea4/0x2bb0 [ 274.846686] ? SyS_mount+0xab/0x120 [ 274.850292] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.855662] ? find_held_lock+0x35/0x1d0 [ 274.859710] ? __lock_is_held+0xb6/0x140 [ 274.863765] ? check_same_owner+0x320/0x320 [ 274.868066] ? rcu_note_context_switch+0x710/0x710 [ 274.872984] should_failslab+0xec/0x120 [ 274.876943] kmem_cache_alloc_trace+0x4b/0x740 [ 274.881502] ? __kmalloc_node+0x33/0x70 [ 274.885451] ? __kmalloc_node+0x33/0x70 [ 274.889408] ? rcu_read_lock_sched_held+0x108/0x120 [ 274.894411] __memcg_init_list_lru_node+0x169/0x270 [ 274.899410] ? list_lru_add+0x7c0/0x7c0 [ 274.903362] ? __kmalloc_node+0x47/0x70 [ 274.907324] __list_lru_init+0x544/0x750 [ 274.911369] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 274.917233] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 274.922240] ? lockdep_init_map+0x9/0x10 [ 274.926286] sget_userns+0x6b1/0xe40 [ 274.929977] ? set_anon_super+0x20/0x20 [ 274.933936] ? put_filp+0x90/0x90 [ 274.937370] ? destroy_unused_super.part.6+0xd0/0xd0 [ 274.942547] ? alloc_vfsmnt+0x762/0x9c0 [ 274.946497] ? path_lookupat+0x238/0xba0 [ 274.950540] ? mnt_free_id.isra.21+0x50/0x50 [ 274.954930] ? trace_hardirqs_off+0x10/0x10 [ 274.959234] ? putname+0xee/0x130 [ 274.962670] ? cap_capable+0x1b5/0x230 [ 274.966546] ? security_capable+0x8e/0xc0 [ 274.970675] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 274.975842] ? ns_capable_common+0xcf/0x160 [ 274.980149] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 274.985316] mount_ns+0x6d/0x190 [ 274.988666] rpc_mount+0x9e/0xd0 [ 274.992023] mount_fs+0x66/0x2d0 [ 274.995373] vfs_kern_mount.part.26+0xc6/0x4a0 [ 274.999936] ? may_umount+0xa0/0xa0 [ 275.003540] ? _raw_read_unlock+0x22/0x30 [ 275.007664] ? __get_fs_type+0x8a/0xc0 [ 275.011538] do_mount+0xea4/0x2bb0 [ 275.015052] ? __might_fault+0x110/0x1d0 [ 275.019104] ? copy_mount_string+0x40/0x40 [ 275.023317] ? __check_object_size+0x8b/0x530 [ 275.027809] ? __might_sleep+0x95/0x190 [ 275.031769] ? kasan_check_write+0x14/0x20 [ 275.035985] ? _copy_from_user+0x99/0x110 [ 275.040119] ? memdup_user+0x5e/0x90 [ 275.043810] ? copy_mount_options+0x1f7/0x2e0 [ 275.048291] SyS_mount+0xab/0x120 [ 275.051723] ? copy_mnt_ns+0xb30/0xb30 [ 275.055605] do_syscall_64+0x281/0x940 [ 275.059471] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 275.064989] ? syscall_return_slowpath+0x550/0x550 [ 275.069903] ? syscall_return_slowpath+0x2ac/0x550 [ 275.074825] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 275.080180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.085015] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.090183] RIP: 0033:0x4548b9 [ 275.093348] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.101032] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 275.108278] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 2033/05/18 03:34:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 275.115786] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 275.123030] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 275.130278] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 275.138903] device lo left promiscuous mode [ 275.147715] device lo entered promiscuous mode 2033/05/18 03:34:09 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:09 executing program 3 (fault-call:13 fault-nth:25): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0x0, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 275.170244] device lo left promiscuous mode 2033/05/18 03:34:09 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 275.195093] device lo entered promiscuous mode [ 275.227065] device lo left promiscuous mode [ 275.232466] FAULT_INJECTION: forcing a failure. [ 275.232466] name failslab, interval 1, probability 0, space 0, times 0 [ 275.243839] CPU: 1 PID: 333 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 275.250851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.260202] Call Trace: [ 275.262799] dump_stack+0x194/0x24d [ 275.266439] ? arch_local_irq_restore+0x53/0x53 [ 275.271110] ? __save_stack_trace+0x7e/0xd0 2033/05/18 03:34:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000001c0), 0x0) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 275.275456] should_fail+0x8c0/0xa40 [ 275.279180] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.284285] ? kasan_kmalloc+0xad/0xe0 [ 275.288171] ? kmem_cache_alloc_trace+0x136/0x740 [ 275.293010] ? __memcg_init_list_lru_node+0x169/0x270 [ 275.298199] ? __list_lru_init+0x544/0x750 [ 275.302430] ? sget_userns+0x6b1/0xe40 [ 275.306318] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 275.311085] ? do_mount+0xea4/0x2bb0 [ 275.314782] ? SyS_mount+0xab/0x120 [ 275.318387] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.323771] ? find_held_lock+0x35/0x1d0 2033/05/18 03:34:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 275.327829] ? __lock_is_held+0xb6/0x140 [ 275.331912] ? check_same_owner+0x320/0x320 [ 275.336245] ? rcu_note_context_switch+0x710/0x710 [ 275.341259] should_failslab+0xec/0x120 [ 275.345225] kmem_cache_alloc_trace+0x4b/0x740 [ 275.349796] ? __kmalloc_node+0x33/0x70 [ 275.353968] ? __kmalloc_node+0x33/0x70 [ 275.357943] ? rcu_read_lock_sched_held+0x108/0x120 [ 275.362996] __memcg_init_list_lru_node+0x169/0x270 [ 275.368631] ? list_lru_add+0x7c0/0x7c0 [ 275.372770] ? __kmalloc_node+0x47/0x70 [ 275.376743] __list_lru_init+0x544/0x750 [ 275.380804] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 275.386677] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 275.391681] ? lockdep_init_map+0x9/0x10 [ 275.395734] sget_userns+0x6b1/0xe40 [ 275.399435] ? set_anon_super+0x20/0x20 [ 275.403413] ? put_filp+0x90/0x90 [ 275.406849] ? destroy_unused_super.part.6+0xd0/0xd0 [ 275.411930] ? alloc_vfsmnt+0x762/0x9c0 [ 275.416065] ? path_lookupat+0x238/0xba0 [ 275.420117] ? mnt_free_id.isra.21+0x50/0x50 [ 275.424607] ? trace_hardirqs_off+0x10/0x10 [ 275.429088] ? putname+0xee/0x130 [ 275.432524] ? cap_capable+0x1b5/0x230 [ 275.436487] ? security_capable+0x8e/0xc0 [ 275.440634] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 275.445805] ? ns_capable_common+0xcf/0x160 [ 275.450108] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 275.455280] mount_ns+0x6d/0x190 [ 275.458630] rpc_mount+0x9e/0xd0 [ 275.461977] mount_fs+0x66/0x2d0 [ 275.465329] vfs_kern_mount.part.26+0xc6/0x4a0 [ 275.469892] ? may_umount+0xa0/0xa0 [ 275.473494] ? _raw_read_unlock+0x22/0x30 [ 275.477619] ? __get_fs_type+0x8a/0xc0 [ 275.481494] do_mount+0xea4/0x2bb0 [ 275.485861] ? __might_fault+0x110/0x1d0 [ 275.489910] ? copy_mount_string+0x40/0x40 [ 275.494123] ? __check_object_size+0x8b/0x530 [ 275.498605] ? __might_sleep+0x95/0x190 [ 275.502569] ? kasan_check_write+0x14/0x20 [ 275.506785] ? _copy_from_user+0x99/0x110 [ 275.510914] ? memdup_user+0x5e/0x90 [ 275.514602] ? copy_mount_options+0x1f7/0x2e0 [ 275.519082] SyS_mount+0xab/0x120 [ 275.522517] ? copy_mnt_ns+0xb30/0xb30 [ 275.526394] do_syscall_64+0x281/0x940 [ 275.530270] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 275.535871] ? syscall_return_slowpath+0x550/0x550 [ 275.540777] ? syscall_return_slowpath+0x2ac/0x550 [ 275.545690] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 275.551038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.555867] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.561036] RIP: 0033:0x4548b9 [ 275.564202] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2033/05/18 03:34:09 executing program 2: r0 = request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)='vboxnet1+system!\x00', 0xfffffffffffffffb) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="f01dc9c3d42317bca3d7562954ab62bea18aa05e0a37efd70e6fb2be126d98537c6985593b99dd114c92089204c81f8c1bffc1f20abcb1226052e1ea8aef9b216d5ad6e615418597cb1bebd5a3bbe8fe5f59505159a62bff9ca953c1c5bd9839d6b99ead65cd49001442bcc9888fbcac8ac2621bbd41b1dcfe93c7a9", 0x7c, r0) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) write$tun(r2, &(0x7f0000000480)={@pi={0x0, 0x884a}, @hdr={0x1, 0x85, 0x8, 0xb5c9, 0x1000, 0x1}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @dev={0xac, 0x14, 0x14, 0x14}, @empty, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x2a) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000040)='\x00', 0x1, r3) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x81, 0x0) ioctl$KVM_SET_TSS_ADDR(r5, 0xae47, 0xd000) keyctl$dh_compute(0x17, &(0x7f0000003340)={r1, 0x0, r4}, &(0x7f0000003380)=""/26, 0x1a, &(0x7f0000003440)={&(0x7f00000033c0)={'vmac(tnepres)\x00'}, &(0x7f0000003400)}) r6 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x40) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r6, 0x3, 0x1, 0x1, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x65, &(0x7f00000003c0)=[@in6={0xa, 0x4e22, 0x2, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e24, 0x1, @mcast1={0xff, 0x1, [], 0x1}, 0x50e}, @in6={0xa, 0x4e21, 0x20, @loopback={0x0, 0x1}, 0x8}], 0x64) [ 275.571975] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 275.579340] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 275.586586] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 275.593833] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 275.601076] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 [ 275.610482] device lo left promiscuous mode [ 275.620265] device lo entered promiscuous mode [ 275.677713] device lo entered promiscuous mode [ 275.687973] device lo left promiscuous mode [ 275.694886] device lo entered promiscuous mode 2033/05/18 03:34:09 executing program 3 (fault-call:13 fault-nth:26): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:09 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:09 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:09 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000280)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000020001100a100000000000000950000e800000000a49d1c35faf5e1fba7d7ca69f761e73ea8f09492885c688e091744e56299377b2ded1bda835dffc4ed95a6ff4a62288692acfbd93a30ad0485195fa2acbcc4f961d8bb22b09035b675e5dfbd01751b8cbc71766a6df8fa072ec5800fa61bbd4e13a83c9a64ce60d6a6a5d09504d249bd2ea313d1afe8dc2fae2a9c8adeeb331279eba1f0145088d871d2c41eb72f50aa15e1515e1b35415974627315b4ba6bf4cfad8e93af5500"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x200001, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000002c0)) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f00000001c0)=0x6) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:09 executing program 2: syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x100) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x10000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000002c0)=""/4096) open(&(0x7f0000000100)='./file0\x00', 0x200, 0x8) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x0, 0x1e, 0x0, 0xf0, "46da9ddb6ac9d05b88b22d86a970a5bb2398dae6698dde653d754a2a75e544ea"}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r1, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x3, 0x30}, 0xffffffffffffffa9) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000002a80), 0x2) r3 = dup(r1) write$eventfd(r3, &(0x7f0000605ff8), 0x10235) write$eventfd(r3, &(0x7f0000000040), 0xfdc8) writev(r3, &(0x7f00000013c0)=[{&(0x7f0000000380)='T', 0x1}], 0x1) perf_event_open(&(0x7f0000223000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg(r4, &(0x7f0000002880)={&(0x7f0000001380)=@ll={0x11, 0x1b, 0x0, 0x1, 0x0, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000001400)="3db7e165b3ff078b0286b624bd83778bb52d36e49c42866a54fa18225ce83ad6edd6f8d96314c173e51f4622cfe221fdf55e9681694761751fc99dfe22b3ea722fa43da1685846f95e162e8c7ba3d9a656f15741bfd1cb4914717fdb51037555ebff24a21dda07f3f7f18cc86de6c400801e0744c1886004982f0140a4f1a47309d392", 0x83}], 0x1, &(0x7f0000002600)=[{0x58, 0x10b, 0x0, "0420e918165afbbb1bc13ae60a2b2349dcf89579a257a19a928322ed15ca4862082664968de0ea669fe1f9e2f0186e60d18f20435a5947bcc3709931bf1b891b8ac4"}], 0x58, 0x800}, 0x40000) mlock2(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0xd70e, 0x40000) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4003, &(0x7f0000000000)=0x9e, 0x7e, 0x5) 2033/05/18 03:34:09 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 275.793319] FAULT_INJECTION: forcing a failure. [ 275.793319] name failslab, interval 1, probability 0, space 0, times 0 [ 275.804963] CPU: 1 PID: 368 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 275.813022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.822565] Call Trace: [ 275.825158] dump_stack+0x194/0x24d [ 275.828797] ? arch_local_irq_restore+0x53/0x53 [ 275.833472] ? __save_stack_trace+0x7e/0xd0 [ 275.837830] should_fail+0x8c0/0xa40 [ 275.841551] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.846659] ? kasan_kmalloc+0xad/0xe0 [ 275.850557] ? kmem_cache_alloc_trace+0x136/0x740 [ 275.855402] ? __memcg_init_list_lru_node+0x169/0x270 [ 275.860594] ? __list_lru_init+0x544/0x750 [ 275.864840] ? sget_userns+0x6b1/0xe40 [ 275.868722] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 275.873479] ? do_mount+0xea4/0x2bb0 [ 275.877195] ? SyS_mount+0xab/0x120 [ 275.880828] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.886204] ? find_held_lock+0x35/0x1d0 [ 275.890356] ? __lock_is_held+0xb6/0x140 [ 275.894441] ? check_same_owner+0x320/0x320 [ 275.898964] ? rcu_note_context_switch+0x710/0x710 [ 275.904068] should_failslab+0xec/0x120 [ 275.908065] kmem_cache_alloc_trace+0x4b/0x740 [ 275.912635] ? __kmalloc_node+0x33/0x70 [ 275.916600] ? __kmalloc_node+0x33/0x70 [ 275.920574] ? rcu_read_lock_sched_held+0x108/0x120 [ 275.925609] __memcg_init_list_lru_node+0x169/0x270 [ 275.930713] ? list_lru_add+0x7c0/0x7c0 [ 275.934672] ? __kmalloc_node+0x47/0x70 [ 275.938635] __list_lru_init+0x544/0x750 [ 275.942681] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 275.948547] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 275.953586] ? lockdep_init_map+0x9/0x10 [ 275.957642] sget_userns+0x6b1/0xe40 [ 275.961330] ? set_anon_super+0x20/0x20 [ 275.965289] ? put_filp+0x90/0x90 [ 275.968731] ? destroy_unused_super.part.6+0xd0/0xd0 [ 275.973809] ? alloc_vfsmnt+0x762/0x9c0 [ 275.977759] ? path_lookupat+0x238/0xba0 [ 275.981884] ? mnt_free_id.isra.21+0x50/0x50 [ 275.986278] ? trace_hardirqs_off+0x10/0x10 [ 275.990580] ? putname+0xee/0x130 [ 275.994023] ? cap_capable+0x1b5/0x230 [ 275.997894] ? security_capable+0x8e/0xc0 [ 276.002031] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 276.007199] ? ns_capable_common+0xcf/0x160 [ 276.011513] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 276.016679] mount_ns+0x6d/0x190 [ 276.020031] rpc_mount+0x9e/0xd0 [ 276.023379] mount_fs+0x66/0x2d0 [ 276.026730] vfs_kern_mount.part.26+0xc6/0x4a0 [ 276.031291] ? may_umount+0xa0/0xa0 [ 276.034903] ? _raw_read_unlock+0x22/0x30 [ 276.039035] ? __get_fs_type+0x8a/0xc0 [ 276.042918] do_mount+0xea4/0x2bb0 [ 276.046442] ? __might_fault+0x110/0x1d0 [ 276.050491] ? copy_mount_string+0x40/0x40 [ 276.054707] ? __check_object_size+0x8b/0x530 [ 276.059191] ? __might_sleep+0x95/0x190 [ 276.063151] ? kasan_check_write+0x14/0x20 [ 276.067364] ? _copy_from_user+0x99/0x110 [ 276.071497] ? memdup_user+0x5e/0x90 [ 276.075188] ? copy_mount_options+0x1f7/0x2e0 [ 276.079669] SyS_mount+0xab/0x120 [ 276.083099] ? copy_mnt_ns+0xb30/0xb30 [ 276.086975] do_syscall_64+0x281/0x940 [ 276.090836] ? __do_page_fault+0xc90/0xc90 [ 276.095047] ? _raw_spin_unlock_irq+0x27/0x70 [ 276.099521] ? finish_task_switch+0x1c1/0x7e0 [ 276.104006] ? syscall_return_slowpath+0x550/0x550 [ 276.108917] ? syscall_return_slowpath+0x2ac/0x550 [ 276.113826] ? prepare_exit_to_usermode+0x350/0x350 [ 276.118823] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 276.124172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.129001] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.134172] RIP: 0033:0x4548b9 [ 276.137347] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.145037] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 276.152279] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 276.159522] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 276.166769] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 276.174017] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 276.184666] device lo left promiscuous mode 2033/05/18 03:34:10 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 3 (fault-call:13 fault-nth:27): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) syz_open_dev$vcsa(&(0x7f0000000b80)='/dev/vcsa#\x00', 0x0, 0x1101203) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/113) syz_fuseblk_mount(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)='./file0\x00', 0xbffd, 0xffffffffffffffff, 0xffffffffffffffff, 0x100000000, 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x442080, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000d80)=""/113) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0xfffffffffffffb74) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000447000)='./file0\x00', &(0x7f00000e1000)='msdos\x00', 0x0, &(0x7f000097bfff)) io_setup(0x3f, &(0x7f0000000540)=0x0) io_submit(r2, 0x3, &(0x7f0000000d40)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x1f, r0, &(0x7f0000000580)}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0xd49, 0xffffffffffffffff, &(0x7f0000000600)}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000a00)}]) openat$cgroup_subtree(r1, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) 2033/05/18 03:34:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setns(r2, 0x44000000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000140)=0xfffffffffffffcf5) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18ffab6401cc3117f0e29c95e4dc50dc0000000000000095"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 276.192472] device lo entered promiscuous mode [ 276.199375] device lo left promiscuous mode [ 276.207250] device lo entered promiscuous mode [ 276.214309] device lo left promiscuous mode [ 276.220813] device lo entered promiscuous mode [ 276.284676] device lo left promiscuous mode [ 276.295535] print_req_error: I/O error, dev loop199, sector 0 [ 276.299383] FAULT_INJECTION: forcing a failure. [ 276.299383] name failslab, interval 1, probability 0, space 0, times 0 [ 276.302200] FAT-fs (loop199): unable to read boot sector [ 276.312926] CPU: 1 PID: 400 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 276.312936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.326772] device lo entered promiscuous mode [ 276.334820] Call Trace: [ 276.334840] dump_stack+0x194/0x24d [ 276.334860] ? arch_local_irq_restore+0x53/0x53 [ 276.334873] ? __save_stack_trace+0x7e/0xd0 [ 276.334908] should_fail+0x8c0/0xa40 [ 276.334926] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.363372] ? kasan_kmalloc+0xad/0xe0 [ 276.367240] ? kmem_cache_alloc_trace+0x136/0x740 [ 276.372067] ? __memcg_init_list_lru_node+0x169/0x270 [ 276.377245] ? __list_lru_init+0x544/0x750 [ 276.381459] ? sget_userns+0x6b1/0xe40 [ 276.385328] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 276.390059] ? do_mount+0xea4/0x2bb0 [ 276.393751] ? SyS_mount+0xab/0x120 [ 276.397365] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.402715] ? find_held_lock+0x35/0x1d0 [ 276.406764] ? __lock_is_held+0xb6/0x140 [ 276.410826] ? check_same_owner+0x320/0x320 [ 276.415129] ? rcu_note_context_switch+0x710/0x710 [ 276.420058] should_failslab+0xec/0x120 [ 276.424031] kmem_cache_alloc_trace+0x4b/0x740 [ 276.428592] ? __kmalloc_node+0x33/0x70 [ 276.432544] ? __kmalloc_node+0x33/0x70 [ 276.436499] ? rcu_read_lock_sched_held+0x108/0x120 [ 276.441509] __memcg_init_list_lru_node+0x169/0x270 [ 276.446512] ? list_lru_add+0x7c0/0x7c0 [ 276.450466] ? __kmalloc_node+0x47/0x70 [ 276.454431] __list_lru_init+0x544/0x750 [ 276.458494] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 276.464362] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 276.469369] ? lockdep_init_map+0x9/0x10 [ 276.473414] sget_userns+0x6b1/0xe40 [ 276.477193] ? set_anon_super+0x20/0x20 [ 276.481153] ? put_filp+0x90/0x90 [ 276.484589] ? destroy_unused_super.part.6+0xd0/0xd0 [ 276.489676] ? alloc_vfsmnt+0x762/0x9c0 [ 276.493628] ? path_lookupat+0x238/0xba0 [ 276.497669] ? mnt_free_id.isra.21+0x50/0x50 [ 276.502065] ? trace_hardirqs_off+0x10/0x10 [ 276.506371] ? putname+0xee/0x130 [ 276.509809] ? cap_capable+0x1b5/0x230 [ 276.513688] ? security_capable+0x8e/0xc0 [ 276.517827] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 276.523017] ? ns_capable_common+0xcf/0x160 [ 276.527328] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 276.532508] mount_ns+0x6d/0x190 [ 276.535860] rpc_mount+0x9e/0xd0 [ 276.539211] mount_fs+0x66/0x2d0 [ 276.542564] vfs_kern_mount.part.26+0xc6/0x4a0 [ 276.547130] ? may_umount+0xa0/0xa0 [ 276.550733] ? _raw_read_unlock+0x22/0x30 [ 276.554862] ? __get_fs_type+0x8a/0xc0 [ 276.558744] do_mount+0xea4/0x2bb0 [ 276.562259] ? __might_fault+0x110/0x1d0 [ 276.566310] ? copy_mount_string+0x40/0x40 [ 276.570535] ? __check_object_size+0x8b/0x530 [ 276.575034] ? __might_sleep+0x95/0x190 [ 276.578999] ? kasan_check_write+0x14/0x20 [ 276.583219] ? _copy_from_user+0x99/0x110 [ 276.587354] ? memdup_user+0x5e/0x90 [ 276.591045] ? copy_mount_options+0x1f7/0x2e0 [ 276.595527] SyS_mount+0xab/0x120 [ 276.598957] ? copy_mnt_ns+0xb30/0xb30 [ 276.602829] do_syscall_64+0x281/0x940 [ 276.606709] ? __do_page_fault+0xc90/0xc90 [ 276.610925] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 276.616451] ? syscall_return_slowpath+0x550/0x550 [ 276.621362] ? syscall_return_slowpath+0x2ac/0x550 [ 276.626277] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 276.631631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.636654] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.641993] RIP: 0033:0x4548b9 [ 276.645171] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.652856] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 276.660103] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 276.667351] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 276.674595] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2033/05/18 03:34:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 276.681843] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 276.707352] device lo left promiscuous mode [ 276.719551] device lo entered promiscuous mode [ 276.747556] print_req_error: I/O error, dev loop199, sector 0 [ 276.754195] FAT-fs (loop199): unable to read boot sector [ 276.768182] device lo left promiscuous mode [ 276.780064] device lo entered promiscuous mode 2033/05/18 03:34:10 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 2: futex(&(0x7f000000cffc), 0x800000000086, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000440)=0x2, 0x1) r0 = gettid() r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8480) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000300)={r2, @in={{0x2, 0x4e22, @multicast1=0xe0000001}}}, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) recvfrom$inet6(r1, &(0x7f00000003c0)=""/25, 0x19, 0x20, &(0x7f0000000400)={0xa, 0x4e22, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={r3, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x84, 0xffff, 0x2000000, 0x2, 0x8001}, &(0x7f0000000140)=0x82) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r4, 0x7, 0x10001}, &(0x7f00000001c0)=0xc) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000480)=0x9, 0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xffffffffffeffffe, 0x10, 0xffffffffffffffff, 0x0) tkill(r0, 0x41) 2033/05/18 03:34:10 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 3 (fault-call:13 fault-nth:28): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.stat\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000002c0)=0x1d, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x1, 0x280000) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r7, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000380)=0x0) ptrace$peek(0x3, r8, &(0x7f00000003c0)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:10 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000001c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={0x0, r3}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000380)=""/84, &(0x7f0000000280)=0x54) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000400)={0x8, 0x6, 0x0, 0x2, 0xfffffffffffffffc, 0x5, 0x10000, 0x1ff, 0x0}, &(0x7f0000000440)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000600)={r7, 0x5}, &(0x7f0000000640)=0x8) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f000031aff8)={r0, r5}) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) [ 276.872558] FAULT_INJECTION: forcing a failure. [ 276.872558] name failslab, interval 1, probability 0, space 0, times 0 [ 276.883870] CPU: 0 PID: 416 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 276.888123] device lo left promiscuous mode [ 276.890884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.890889] Call Trace: [ 276.890914] dump_stack+0x194/0x24d [ 276.890936] ? arch_local_irq_restore+0x53/0x53 [ 276.915485] ? __save_stack_trace+0x7e/0xd0 [ 276.919802] should_fail+0x8c0/0xa40 [ 276.923522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.928625] ? kasan_kmalloc+0xad/0xe0 [ 276.932502] ? kmem_cache_alloc_trace+0x136/0x740 [ 276.937343] ? __memcg_init_list_lru_node+0x169/0x270 [ 276.942521] ? __list_lru_init+0x544/0x750 [ 276.946738] ? sget_userns+0x6b1/0xe40 [ 276.950614] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 276.955352] ? do_mount+0xea4/0x2bb0 [ 276.959078] ? SyS_mount+0xab/0x120 [ 276.962701] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.968054] ? find_held_lock+0x35/0x1d0 [ 276.972103] ? __lock_is_held+0xb6/0x140 [ 276.976163] ? check_same_owner+0x320/0x320 [ 276.980467] ? rcu_note_context_switch+0x710/0x710 [ 276.985387] should_failslab+0xec/0x120 [ 276.989339] kmem_cache_alloc_trace+0x4b/0x740 [ 276.993903] ? __kmalloc_node+0x33/0x70 [ 276.997853] ? __kmalloc_node+0x33/0x70 [ 277.001803] ? rcu_read_lock_sched_held+0x108/0x120 [ 277.006807] __memcg_init_list_lru_node+0x169/0x270 [ 277.011805] ? list_lru_add+0x7c0/0x7c0 [ 277.015758] ? __kmalloc_node+0x47/0x70 [ 277.019720] __list_lru_init+0x544/0x750 [ 277.023767] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 277.029632] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 277.034635] ? lockdep_init_map+0x9/0x10 [ 277.038680] sget_userns+0x6b1/0xe40 [ 277.042371] ? set_anon_super+0x20/0x20 [ 277.046327] ? put_filp+0x90/0x90 [ 277.049760] ? destroy_unused_super.part.6+0xd0/0xd0 [ 277.054837] ? alloc_vfsmnt+0x762/0x9c0 [ 277.058789] ? path_lookupat+0x238/0xba0 [ 277.062825] ? mnt_free_id.isra.21+0x50/0x50 [ 277.067215] ? trace_hardirqs_off+0x10/0x10 [ 277.071517] ? putname+0xee/0x130 [ 277.074955] ? cap_capable+0x1b5/0x230 [ 277.078826] ? security_capable+0x8e/0xc0 [ 277.082967] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 277.088133] ? ns_capable_common+0xcf/0x160 [ 277.092434] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 277.097601] mount_ns+0x6d/0x190 [ 277.100952] rpc_mount+0x9e/0xd0 [ 277.104303] mount_fs+0x66/0x2d0 [ 277.107664] vfs_kern_mount.part.26+0xc6/0x4a0 [ 277.112226] ? may_umount+0xa0/0xa0 [ 277.115831] ? _raw_read_unlock+0x22/0x30 [ 277.119957] ? __get_fs_type+0x8a/0xc0 [ 277.123831] do_mount+0xea4/0x2bb0 [ 277.127345] ? __might_fault+0x110/0x1d0 [ 277.131396] ? copy_mount_string+0x40/0x40 [ 277.135610] ? __check_object_size+0x8b/0x530 [ 277.140096] ? __might_sleep+0x95/0x190 [ 277.144057] ? kasan_check_write+0x14/0x20 [ 277.148268] ? _copy_from_user+0x99/0x110 [ 277.152396] ? memdup_user+0x5e/0x90 [ 277.156084] ? copy_mount_options+0x1f7/0x2e0 [ 277.160563] SyS_mount+0xab/0x120 [ 277.163990] ? copy_mnt_ns+0xb30/0xb30 [ 277.167863] do_syscall_64+0x281/0x940 [ 277.171728] ? __do_page_fault+0xc90/0xc90 [ 277.175938] ? _raw_spin_unlock_irq+0x27/0x70 [ 277.180413] ? finish_task_switch+0x1c1/0x7e0 [ 277.184893] ? syscall_return_slowpath+0x550/0x550 [ 277.189800] ? syscall_return_slowpath+0x2ac/0x550 [ 277.194708] ? prepare_exit_to_usermode+0x350/0x350 [ 277.199703] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 277.205050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.209892] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.215059] RIP: 0033:0x4548b9 [ 277.218224] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.226080] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 277.233325] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 277.240575] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 277.247825] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 277.255077] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 277.263525] device lo left promiscuous mode 2033/05/18 03:34:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000d35ff9)={0x14, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x15}}, 0x14}, 0x1}, 0x0) socketpair(0x13, 0x1, 0x5, &(0x7f0000000240)) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x9, 0x8000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x6, 0x2, 0x10000, 0xfff, 0x81, {0x0, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x401, 0x6, 0x5, 0xfffffffffffffffb, 0x3}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x5, 0x7, 0x4, 0x6c7, 0x9}, 0x14) 2033/05/18 03:34:11 executing program 3 (fault-call:13 fault-nth:29): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 277.273092] device lo entered promiscuous mode [ 277.291730] device lo entered promiscuous mode 2033/05/18 03:34:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 277.348710] device lo left promiscuous mode [ 277.367447] FAULT_INJECTION: forcing a failure. [ 277.367447] name failslab, interval 1, probability 0, space 0, times 0 [ 277.369133] device lo entered promiscuous mode [ 277.378735] CPU: 1 PID: 446 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 277.378744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.399653] Call Trace: [ 277.402226] dump_stack+0x194/0x24d [ 277.405833] ? arch_local_irq_restore+0x53/0x53 [ 277.410477] ? __save_stack_trace+0x7e/0xd0 [ 277.414792] should_fail+0x8c0/0xa40 [ 277.418490] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.423572] ? kasan_kmalloc+0xad/0xe0 [ 277.427438] ? kmem_cache_alloc_trace+0x136/0x740 [ 277.432255] ? __memcg_init_list_lru_node+0x169/0x270 [ 277.437420] ? __list_lru_init+0x544/0x750 [ 277.441631] ? sget_userns+0x6b1/0xe40 [ 277.445498] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 277.450227] ? do_mount+0xea4/0x2bb0 [ 277.453913] ? SyS_mount+0xab/0x120 [ 277.457516] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.462864] ? find_held_lock+0x35/0x1d0 [ 277.466911] ? __lock_is_held+0xb6/0x140 [ 277.470971] ? check_same_owner+0x320/0x320 [ 277.475275] ? rcu_note_context_switch+0x710/0x710 [ 277.480192] should_failslab+0xec/0x120 [ 277.484146] kmem_cache_alloc_trace+0x4b/0x740 [ 277.489430] ? __kmalloc_node+0x33/0x70 [ 277.493383] ? __kmalloc_node+0x33/0x70 [ 277.497370] ? rcu_read_lock_sched_held+0x108/0x120 [ 277.502382] __memcg_init_list_lru_node+0x169/0x270 [ 277.507383] ? list_lru_add+0x7c0/0x7c0 [ 277.511337] ? __kmalloc_node+0x47/0x70 [ 277.515299] __list_lru_init+0x544/0x750 [ 277.519343] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 277.525208] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 277.530295] ? lockdep_init_map+0x9/0x10 [ 277.534335] sget_userns+0x6b1/0xe40 [ 277.538025] ? set_anon_super+0x20/0x20 [ 277.541981] ? put_filp+0x90/0x90 [ 277.545417] ? destroy_unused_super.part.6+0xd0/0xd0 [ 277.550493] ? alloc_vfsmnt+0x762/0x9c0 [ 277.554454] ? path_lookupat+0x238/0xba0 [ 277.558493] ? mnt_free_id.isra.21+0x50/0x50 [ 277.562885] ? trace_hardirqs_off+0x10/0x10 [ 277.567364] ? putname+0xee/0x130 [ 277.570890] ? cap_capable+0x1b5/0x230 [ 277.574762] ? security_capable+0x8e/0xc0 [ 277.578893] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 277.584058] ? ns_capable_common+0xcf/0x160 [ 277.588363] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 277.593530] mount_ns+0x6d/0x190 [ 277.596884] rpc_mount+0x9e/0xd0 [ 277.600235] mount_fs+0x66/0x2d0 [ 277.603585] vfs_kern_mount.part.26+0xc6/0x4a0 [ 277.608144] ? may_umount+0xa0/0xa0 [ 277.611748] ? _raw_read_unlock+0x22/0x30 [ 277.615874] ? __get_fs_type+0x8a/0xc0 [ 277.619748] do_mount+0xea4/0x2bb0 [ 277.623266] ? __might_fault+0x110/0x1d0 [ 277.627316] ? copy_mount_string+0x40/0x40 [ 277.631532] ? __check_object_size+0x8b/0x530 [ 277.636024] ? __might_sleep+0x95/0x190 [ 277.639983] ? kasan_check_write+0x14/0x20 [ 277.644197] ? _copy_from_user+0x99/0x110 [ 277.648325] ? memdup_user+0x5e/0x90 [ 277.652021] ? copy_mount_options+0x1f7/0x2e0 [ 277.656501] SyS_mount+0xab/0x120 [ 277.659939] ? copy_mnt_ns+0xb30/0xb30 [ 277.663803] do_syscall_64+0x281/0x940 [ 277.667664] ? __do_page_fault+0xc90/0xc90 [ 277.671876] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 277.677391] ? syscall_return_slowpath+0x550/0x550 [ 277.682296] ? syscall_return_slowpath+0x2ac/0x550 [ 277.687208] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 277.692562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.697478] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.702641] RIP: 0033:0x4548b9 [ 277.705804] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.713489] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 277.720733] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 277.727975] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 277.735222] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 277.742468] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2033/05/18 03:34:11 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 277.752960] device lo left promiscuous mode [ 277.770896] device lo entered promiscuous mode 2033/05/18 03:34:11 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 3 (fault-call:13 fault-nth:30): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000001c0)={@empty, 0x0}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'irlan0\x00', r1}) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d, r2}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) getsockname(r0, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f000000a000)={0x1d}, 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5f700000000000000004e2f9663a918fa1efd9b0b"}, 0xfeb8}, 0x1}, 0x0) 2033/05/18 03:34:11 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x800, 0x40) 2033/05/18 03:34:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x0, 0x0) epoll_wait(r3, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x9) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f000031aff8)={r0, r6}) sendmsg$kcm(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000000)={r4}) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:11 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:11 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 277.890274] FAULT_INJECTION: forcing a failure. [ 277.890274] name failslab, interval 1, probability 0, space 0, times 0 [ 277.901582] CPU: 0 PID: 474 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 277.908601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.918007] Call Trace: [ 277.920606] dump_stack+0x194/0x24d [ 277.924249] ? arch_local_irq_restore+0x53/0x53 [ 277.928939] ? __save_stack_trace+0x7e/0xd0 [ 277.933290] should_fail+0x8c0/0xa40 [ 277.937003] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.942100] ? kasan_kmalloc+0xad/0xe0 [ 277.945988] ? kmem_cache_alloc_trace+0x136/0x740 [ 277.950834] ? __memcg_init_list_lru_node+0x169/0x270 [ 277.956022] ? __list_lru_init+0x544/0x750 [ 277.960255] ? sget_userns+0x6b1/0xe40 [ 277.964147] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 277.968929] ? do_mount+0xea4/0x2bb0 [ 277.972629] ? SyS_mount+0xab/0x120 [ 277.976246] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.981619] ? find_held_lock+0x35/0x1d0 [ 277.985688] ? __lock_is_held+0xb6/0x140 [ 277.989785] ? check_same_owner+0x320/0x320 [ 277.994118] ? rcu_note_context_switch+0x710/0x710 [ 277.999051] should_failslab+0xec/0x120 [ 278.003011] kmem_cache_alloc_trace+0x4b/0x740 [ 278.007649] ? __kmalloc_node+0x33/0x70 [ 278.011600] ? __kmalloc_node+0x33/0x70 [ 278.015554] ? rcu_read_lock_sched_held+0x108/0x120 [ 278.020555] __memcg_init_list_lru_node+0x169/0x270 [ 278.025554] ? list_lru_add+0x7c0/0x7c0 [ 278.029507] ? __kmalloc_node+0x47/0x70 [ 278.033484] __list_lru_init+0x544/0x750 [ 278.037533] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 278.043400] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 278.048667] ? lockdep_init_map+0x9/0x10 [ 278.052718] sget_userns+0x6b1/0xe40 [ 278.056411] ? set_anon_super+0x20/0x20 [ 278.060382] ? put_filp+0x90/0x90 [ 278.063823] ? destroy_unused_super.part.6+0xd0/0xd0 [ 278.068906] ? alloc_vfsmnt+0x762/0x9c0 [ 278.072876] ? path_lookupat+0x238/0xba0 [ 278.076915] ? mnt_free_id.isra.21+0x50/0x50 [ 278.081312] ? trace_hardirqs_off+0x10/0x10 [ 278.085616] ? putname+0xee/0x130 [ 278.089055] ? cap_capable+0x1b5/0x230 [ 278.092931] ? security_capable+0x8e/0xc0 [ 278.097067] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 278.102236] ? ns_capable_common+0xcf/0x160 [ 278.106548] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 278.111716] mount_ns+0x6d/0x190 [ 278.115066] rpc_mount+0x9e/0xd0 [ 278.118416] mount_fs+0x66/0x2d0 [ 278.121766] vfs_kern_mount.part.26+0xc6/0x4a0 [ 278.126332] ? may_umount+0xa0/0xa0 [ 278.129939] ? _raw_read_unlock+0x22/0x30 [ 278.134070] ? __get_fs_type+0x8a/0xc0 [ 278.137946] do_mount+0xea4/0x2bb0 [ 278.141461] ? __might_fault+0x110/0x1d0 [ 278.145514] ? copy_mount_string+0x40/0x40 [ 278.149731] ? __check_object_size+0x8b/0x530 [ 278.154218] ? __might_sleep+0x95/0x190 [ 278.158183] ? kasan_check_write+0x14/0x20 [ 278.162394] ? _copy_from_user+0x99/0x110 [ 278.166525] ? memdup_user+0x5e/0x90 [ 278.170218] ? copy_mount_options+0x1f7/0x2e0 [ 278.174703] SyS_mount+0xab/0x120 [ 278.178137] ? copy_mnt_ns+0xb30/0xb30 [ 278.182019] do_syscall_64+0x281/0x940 [ 278.186334] ? __do_page_fault+0xc90/0xc90 [ 278.190543] ? _raw_spin_unlock_irq+0x27/0x70 [ 278.195024] ? finish_task_switch+0x1c1/0x7e0 [ 278.199502] ? syscall_return_slowpath+0x550/0x550 [ 278.204423] ? syscall_return_slowpath+0x2ac/0x550 [ 278.209333] ? prepare_exit_to_usermode+0x350/0x350 [ 278.214332] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 278.219690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.224523] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.229693] RIP: 0033:0x4548b9 [ 278.232947] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.240644] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 278.247891] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 278.255137] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 278.262381] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 278.269627] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e [ 278.277976] device lo left promiscuous mode [ 278.284235] device lo left promiscuous mode 2033/05/18 03:34:12 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 278.290509] device lo entered promiscuous mode 2033/05/18 03:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x1, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000380)={r1, 0x1, 0x6}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r2}, @call={0x85}], &(0x7f0000000140)='GPL\x00', 0x41, 0xa7, &(0x7f00000004c0)=""/167}, 0x48) 2033/05/18 03:34:12 executing program 3 (fault-call:13 fault-nth:31): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 278.318700] device lo entered promiscuous mode 2033/05/18 03:34:12 executing program 2: syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7ff, 0x880) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000001c0)=""/46, 0x9) poll(&(0x7f0000000000)=[{r0, 0x210}, {r0, 0x8}, {r0, 0x400}], 0x3, 0x9) [ 278.344877] device lo left promiscuous mode [ 278.359475] device lo left promiscuous mode [ 278.380393] device lo entered promiscuous mode [ 278.392892] FAULT_INJECTION: forcing a failure. [ 278.392892] name failslab, interval 1, probability 0, space 0, times 0 [ 278.404564] CPU: 0 PID: 504 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 278.411575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.420931] Call Trace: [ 278.423520] dump_stack+0x194/0x24d [ 278.427159] ? arch_local_irq_restore+0x53/0x53 [ 278.431857] should_fail+0x8c0/0xa40 [ 278.435572] ? __list_lru_init+0x352/0x750 [ 278.439813] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.444918] ? trace_hardirqs_off+0x10/0x10 [ 278.449236] ? find_next_zero_bit+0xe3/0x110 [ 278.453667] ? find_held_lock+0x35/0x1d0 [ 278.457735] ? __lock_is_held+0xb6/0x140 [ 278.461824] ? check_same_owner+0x320/0x320 [ 278.466134] ? lock_downgrade+0x980/0x980 [ 278.470259] device lo entered promiscuous mode [ 278.474832] ? rcu_note_context_switch+0x710/0x710 [ 278.479783] ? find_held_lock+0x35/0x1d0 [ 278.483865] should_failslab+0xec/0x120 [ 278.488156] __kmalloc+0x63/0x760 [ 278.491611] ? lock_downgrade+0x980/0x980 2033/05/18 03:34:12 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f00000001c0)={'ifb0\x00', 0x1f}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="0095000049678e8762ef5e9dd2f199acff000000000000cea697eab3d0d4476d0d0000c11fb938090117e204bad3935cd06309d4e0583f9813b32408ba5f6347ba9a7192c7a98f79797d93cb504a356d65457b0925679b8824750091f0a4fea0e570e43a626c5eec0043ad971b77427f0896a0163d0969a8"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r0, r4}) sendmsg$kcm(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x4e21, 0x2, @local={0xfe, 0x80, [], 0xaa}}}}, 0x88) [ 278.495774] ? register_shrinker+0x10e/0x2d0 [ 278.500181] ? trace_event_raw_event_module_request+0x320/0x320 [ 278.506253] register_shrinker+0x10e/0x2d0 [ 278.510491] ? prepare_kswapd_sleep+0x1f0/0x1f0 [ 278.515165] ? memcpy+0x45/0x50 [ 278.518455] sget_userns+0xbbf/0xe40 [ 278.522161] ? set_anon_super+0x20/0x20 [ 278.526144] ? put_filp+0x90/0x90 [ 278.529595] ? destroy_unused_super.part.6+0xd0/0xd0 [ 278.534691] ? path_lookupat+0x238/0xba0 [ 278.538745] ? mnt_free_id.isra.21+0x50/0x50 [ 278.543262] ? trace_hardirqs_off+0x10/0x10 [ 278.547595] ? putname+0xee/0x130 [ 278.551054] ? cap_capable+0x1b5/0x230 [ 278.554946] ? security_capable+0x8e/0xc0 [ 278.559094] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 278.564275] ? ns_capable_common+0xcf/0x160 [ 278.568781] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 278.574061] mount_ns+0x6d/0x190 [ 278.577614] rpc_mount+0x9e/0xd0 [ 278.580988] mount_fs+0x66/0x2d0 [ 278.584360] vfs_kern_mount.part.26+0xc6/0x4a0 [ 278.588943] ? may_umount+0xa0/0xa0 2033/05/18 03:34:12 executing program 2: mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) r1 = getpgid(r0) r2 = syz_open_procfs(r1, &(0x7f0000000180)='net/raw\x00') getdents64(r2, &(0x7f0000000040)=""/66, 0xffffffffffffffef) getdents(r2, &(0x7f0000000500)=""/249, 0xf9) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0xfffffffffffeffff, 0x0, 0x1, 0x5}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000140)={0x2c8c5a16, r3, 0x10001, 0x74db3737}) getdents64(r2, &(0x7f00000002c0)=""/528, 0x4e0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000000)={{0x7, 0x4, 0x9, 0x6dcb, 0xc7, 0x401}, 0x1}) [ 278.592563] ? _raw_read_unlock+0x22/0x30 [ 278.596704] ? __get_fs_type+0x8a/0xc0 [ 278.600601] do_mount+0xea4/0x2bb0 [ 278.604139] ? __might_fault+0x110/0x1d0 [ 278.608213] ? copy_mount_string+0x40/0x40 [ 278.612451] ? __check_object_size+0x8b/0x530 [ 278.616961] ? __might_sleep+0x95/0x190 [ 278.620944] ? kasan_check_write+0x14/0x20 [ 278.625172] ? _copy_from_user+0x99/0x110 [ 278.629321] ? memdup_user+0x5e/0x90 [ 278.633035] ? copy_mount_options+0x1f7/0x2e0 [ 278.637545] SyS_mount+0xab/0x120 [ 278.640996] ? copy_mnt_ns+0xb30/0xb30 [ 278.644887] do_syscall_64+0x281/0x940 [ 278.648773] ? __do_page_fault+0xc90/0xc90 [ 278.653734] ? _raw_spin_unlock_irq+0x27/0x70 [ 278.658232] ? finish_task_switch+0x1c1/0x7e0 [ 278.662730] ? syscall_return_slowpath+0x550/0x550 [ 278.667666] ? syscall_return_slowpath+0x2ac/0x550 [ 278.672594] ? prepare_exit_to_usermode+0x350/0x350 [ 278.677611] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 278.682968] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.687807] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.692971] RIP: 0033:0x4548b9 2033/05/18 03:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 278.696137] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.703826] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 278.711078] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 278.718328] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 278.725661] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 278.732911] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 278.777919] device lo left promiscuous mode [ 278.798404] device lo entered promiscuous mode 2033/05/18 03:34:12 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 3 (fault-call:13 fault-nth:32): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x4000000000000000, 0x1}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = syz_open_pts(r0, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000000c0)={'nr0\x00', {0x2, 0x4e24, @multicast1=0xe0000001}}) write(r2, &(0x7f0000000000), 0x0) 2033/05/18 03:34:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x3, 0x7, 0x6, 0x6, 0x0, 0x7, 0x8030, 0x0, 0x51e, 0x4, 0x8, 0xffffffff, 0x7, 0xf7f, 0x0, 0x6, 0x1, 0x8, 0x4, 0x81, 0x1000, 0x7fe00000, 0x948, 0x0, 0x80000001, 0x3, 0x7ff, 0x7, 0x7f, 0x3, 0x7ff, 0x63, 0x0, 0x1, 0x7, 0x90, 0x0, 0xc0, 0x7, @perf_config_ext={0x200, 0x7}, 0x4000, 0x5, 0x5, 0x7, 0x7, 0x9, 0x9}, r5, 0xf, r4, 0x1) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f000031aff8)={r0, r6}) sendmsg$kcm(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f00000001c0), 0x4) 2033/05/18 03:34:12 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'lo\x00', 0x101}) shutdown(r1, 0x1) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x0, 0x64add3d2}, 0x8) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000300)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "e5a41c893a5fcc5d4ea885947886f1c890dacfc06e588016879d4954e83c27c24f34b8cca30f7586812d29ff42fe76c8eec88c86b65b05442b698743177feb"}, 0x60) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={r0, r3}) sendmsg$kcm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="5f4be9", 0x3}], 0x1, &(0x7f0000000640)}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000200)=0x3ff, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) sendto$inet6(0xffffffffffffffff, &(0x7f0000925000)="e0", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 2033/05/18 03:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 278.825449] device lo left promiscuous mode [ 278.831064] device lo entered promiscuous mode 2033/05/18 03:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 278.899639] FAULT_INJECTION: forcing a failure. [ 278.899639] name failslab, interval 1, probability 0, space 0, times 0 [ 278.910985] CPU: 0 PID: 533 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 278.918002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.927352] Call Trace: [ 278.929949] dump_stack+0x194/0x24d [ 278.933588] ? arch_local_irq_restore+0x53/0x53 [ 278.938289] should_fail+0x8c0/0xa40 [ 278.942003] ? __list_lru_init+0x352/0x750 2033/05/18 03:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:12 executing program 2: shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ffb000/0x2000)=nil) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0xc000000) perf_event_open(&(0x7f000000a000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) [ 278.946246] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.951353] ? trace_hardirqs_off+0x10/0x10 [ 278.955672] ? find_next_zero_bit+0xe3/0x110 [ 278.960101] ? find_held_lock+0x35/0x1d0 [ 278.964169] ? __lock_is_held+0xb6/0x140 [ 278.968253] ? check_same_owner+0x320/0x320 [ 278.972569] ? lock_downgrade+0x980/0x980 [ 278.976725] ? rcu_note_context_switch+0x710/0x710 [ 278.981657] ? find_held_lock+0x35/0x1d0 [ 278.985736] should_failslab+0xec/0x120 [ 278.989711] __kmalloc+0x63/0x760 [ 278.993180] ? lock_downgrade+0x980/0x980 [ 278.997332] ? register_shrinker+0x10e/0x2d0 [ 279.001739] ? trace_event_raw_event_module_request+0x320/0x320 [ 279.007790] register_shrinker+0x10e/0x2d0 [ 279.012009] ? prepare_kswapd_sleep+0x1f0/0x1f0 [ 279.016664] ? memcpy+0x45/0x50 [ 279.019928] sget_userns+0xbbf/0xe40 [ 279.023618] ? set_anon_super+0x20/0x20 [ 279.027590] ? put_filp+0x90/0x90 [ 279.031036] ? destroy_unused_super.part.6+0xd0/0xd0 [ 279.036127] ? path_lookupat+0x238/0xba0 [ 279.040175] ? mnt_free_id.isra.21+0x50/0x50 [ 279.044577] ? trace_hardirqs_off+0x10/0x10 [ 279.048889] ? putname+0xee/0x130 [ 279.052334] ? cap_capable+0x1b5/0x230 [ 279.056217] ? security_capable+0x8e/0xc0 [ 279.060357] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 279.065525] ? ns_capable_common+0xcf/0x160 [ 279.069837] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 279.075008] mount_ns+0x6d/0x190 [ 279.078369] rpc_mount+0x9e/0xd0 [ 279.086849] mount_fs+0x66/0x2d0 [ 279.090207] vfs_kern_mount.part.26+0xc6/0x4a0 [ 279.094775] ? may_umount+0xa0/0xa0 [ 279.098382] ? _raw_read_unlock+0x22/0x30 [ 279.102510] ? __get_fs_type+0x8a/0xc0 [ 279.106393] do_mount+0xea4/0x2bb0 [ 279.109910] ? __might_fault+0x110/0x1d0 [ 279.113969] ? copy_mount_string+0x40/0x40 [ 279.118191] ? __check_object_size+0x8b/0x530 [ 279.122685] ? __might_sleep+0x95/0x190 [ 279.126662] ? kasan_check_write+0x14/0x20 [ 279.130874] ? _copy_from_user+0x99/0x110 [ 279.135017] ? memdup_user+0x5e/0x90 [ 279.138714] ? copy_mount_options+0x1f7/0x2e0 [ 279.143201] SyS_mount+0xab/0x120 [ 279.146637] ? copy_mnt_ns+0xb30/0xb30 [ 279.150514] do_syscall_64+0x281/0x940 [ 279.154386] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 279.159908] ? syscall_return_slowpath+0x550/0x550 [ 279.164823] ? syscall_return_slowpath+0x2ac/0x550 [ 279.169745] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 279.175113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.179958] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.185132] RIP: 0033:0x4548b9 [ 279.188302] RSP: 002b:00007f2eebe01c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 279.195993] RAX: ffffffffffffffda RBX: 00007f2eebe026d4 RCX: 00000000004548b9 [ 279.203248] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 279.210494] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 279.217742] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 279.224989] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 279.232738] device lo left promiscuous mode 2033/05/18 03:34:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x0, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:13 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r3, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:13 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2033/05/18 03:34:13 executing program 3 (fault-call:13 fault-nth:33): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e94", 0xd6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r4, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 279.254372] device lo left promiscuous mode [ 279.263123] device lo entered promiscuous mode [ 279.286487] device lo entered promiscuous mode [ 279.292953] device lo left promiscuous mode 2033/05/18 03:34:13 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x9, &(0x7f0000000580)=@framed={{0x18}, [@map={0x18, 0x0, 0x1}, @generic={0x3ff, 0xfffffffffffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x10c01, 0x0) connect$bt_l2cap(r2, &(0x7f00000009c0)={0x1f, 0x7f, {0xf0, 0x8, 0x9, 0x6, 0x2d33, 0x4}, 0xfffffffffffffff9, 0x8}, 0xe) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000700)='proc!@ppp1!ppp0ppp0#)lo\\lolo{\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 279.300692] device lo entered promiscuous mode [ 279.315354] ------------[ cut here ]------------ [ 279.320177] refcount_t: increment on 0; use-after-free. [ 279.325722] WARNING: CPU: 0 PID: 4461 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 279.333427] Kernel panic - not syncing: panic_on_warn set ... [ 279.333427] [ 279.340786] CPU: 0 PID: 4461 Comm: syz-executor3 Not tainted 4.16.0-rc7+ #6 [ 279.347877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.357223] Call Trace: [ 279.359806] dump_stack+0x194/0x24d [ 279.363439] ? arch_local_irq_restore+0x53/0x53 [ 279.368113] ? vsnprintf+0x1ed/0x1900 [ 279.371926] panic+0x1e4/0x41c [ 279.375121] ? refcount_error_report+0x214/0x214 [ 279.379871] ? show_regs_print_info+0x18/0x18 [ 279.384360] ? __warn+0x1c1/0x200 [ 279.387795] ? refcount_inc+0x47/0x50 [ 279.391579] __warn+0x1dc/0x200 [ 279.394838] ? refcount_inc+0x47/0x50 [ 279.398628] report_bug+0x1f4/0x2b0 [ 279.402243] fixup_bug.part.11+0x37/0x80 [ 279.406287] do_error_trap+0x2d7/0x3e0 [ 279.410157] ? vprintk_default+0x28/0x30 [ 279.414199] ? math_error+0x400/0x400 [ 279.417983] ? printk+0xaa/0xca [ 279.421259] ? show_regs_print_info+0x18/0x18 [ 279.425755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.430581] do_invalid_op+0x1b/0x20 [ 279.434271] invalid_op+0x1b/0x40 [ 279.437712] RIP: 0010:refcount_inc+0x47/0x50 [ 279.442099] RSP: 0018:ffff8801af79f860 EFLAGS: 00010286 [ 279.447441] RAX: dffffc0000000008 RBX: ffff8801d26bc104 RCX: ffffffff815b7bde [ 279.454713] RDX: 0000000000000000 RSI: 1ffff10035ef3ebc RDI: 1ffff10035ef3e91 [ 279.461994] RBP: ffff8801af79f868 R08: ffffffff87b3b658 R09: 0000000000000000 [ 279.469255] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801af79faf8 [ 279.476507] R13: ffff8801ba2f3513 R14: ffff8801d26bc100 R15: ffff8801ba2f3501 [ 279.483780] ? vprintk_func+0x5e/0xc0 [ 279.487577] sk_alloc+0x3f9/0x1440 [ 279.491107] ? sock_def_error_report+0x5e0/0x5e0 [ 279.495845] ? perf_trace_lock+0x900/0x900 [ 279.500058] ? trace_hardirqs_off+0x10/0x10 [ 279.504356] ? do_raw_write_unlock+0x290/0x290 [ 279.508918] ? perf_trace_lock+0xd6/0x900 [ 279.513129] ? perf_trace_lock_acquire+0xe3/0x980 [ 279.517954] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 279.523048] ? find_held_lock+0x35/0x1d0 [ 279.527112] ? inet_create+0x3fc/0xf50 [ 279.530991] ? lock_downgrade+0x980/0x980 [ 279.535127] ? lock_release+0xa40/0xa40 [ 279.539082] ? lock_downgrade+0x980/0x980 [ 279.543242] inet_create+0x47c/0xf50 [ 279.546943] ? ipip_gro_receive+0xf0/0xf0 [ 279.551078] ? __lock_is_held+0xb6/0x140 [ 279.555157] __sock_create+0x4d4/0x850 [ 279.559042] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 279.563961] ? user_path_create+0x40/0x40 [ 279.568112] SyS_socket+0xeb/0x1d0 [ 279.571625] ? fillonedir+0x250/0x250 [ 279.575417] ? move_addr_to_kernel+0x60/0x60 [ 279.579806] ? getname_flags+0x256/0x580 [ 279.583854] ? do_syscall_64+0xb7/0x940 [ 279.587817] ? move_addr_to_kernel+0x60/0x60 [ 279.592206] do_syscall_64+0x281/0x940 [ 279.596077] ? __do_page_fault+0xc90/0xc90 [ 279.600300] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 279.605836] ? syscall_return_slowpath+0x550/0x550 [ 279.610745] ? syscall_return_slowpath+0x2ac/0x550 [ 279.615682] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 279.621041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.625871] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.631043] RIP: 0033:0x4573e7 [ 279.634215] RSP: 002b:00007fffdeb62308 EFLAGS: 00000206 ORIG_RAX: 0000000000000029 [ 279.641897] RAX: ffffffffffffffda RBX: 00000000000003f3 RCX: 00000000004573e7 [ 279.649143] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 279.656395] RBP: 00007fffdeb629b0 R08: 0000000000000000 R09: 0000000000000001 [ 279.663642] R10: 000000000000000a R11: 0000000000000206 R12: 0000000000000c1e [ 279.670896] R13: 0000000000000c1e R14: 0000000000000015 R15: 000000000004415e [ 279.678596] Dumping ftrace buffer: [ 279.682308] (ftrace buffer empty) [ 279.686000] Kernel Offset: disabled [ 279.689605] Rebooting in 86400 seconds..