_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom$netrom(r0, &(0x7f0000000140)=""/125, 0x7d, 0x40000000, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{}]}) 04:51:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x600}) 04:51:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:04 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:04 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xff, 0x40a00) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1e) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000000c0)=':lo.]user}\x00', &(0x7f0000000100)='./file0/file0\x00', 0xffffffffffffffff) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000080)) 04:51:04 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x700}) [ 812.213698][T11614] EXT4-fs (sda1): Ignoring removed bh option [ 812.250998][T11614] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 04:51:04 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8001, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000180)=0xfffffffffffffff8, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x4e21, @broadcast}, {0x306}, 0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}, 'nr0\x00'}) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000040)={0x9, 0x216, 0xfffffffffffffff4}) 04:51:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 812.250998][T11614] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 812.250998][T11614] 04:51:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x4000}) [ 812.354372][T11614] EXT4-fs (sda1): quotafile must be on filesystem root 04:51:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom$netrom(r0, &(0x7f0000000140)=""/125, 0x7d, 0x40000000, 0x0, 0x0) 04:51:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x240) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f00000001c0)) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000140)={[{0xb1e, 0xfd, 0x6, 0x2, 0x2, 0x6, 0x4, 0x337600000000, 0x5, 0x7ff, 0x8, 0x7, 0x65b}, {0x6, 0x3, 0xb000000000000000, 0x7a, 0x800, 0x200, 0x5, 0x4bbc, 0x7fffffff, 0x7, 0x80, 0x3, 0x3ff}, {0x400, 0x7, 0x7, 0x9, 0xfffffffffffffff7, 0x5, 0xf28, 0x8, 0xff, 0x80000000, 0x5, 0x7642490b, 0x1d3}], 0x6}) 04:51:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:05 executing program 4: syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x2, 0x200) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1ff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000080)={0x1}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x20, "7e65c5f519d977f51a13cf070a1785efb15d3f2ac90cf5de9b2408d4f8f3f9cf"}, &(0x7f0000000040)=0x28) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0xfffffffffffffe01, 0x4, 0x1, 0xfff, r1}, 0x10) 04:51:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0xff00}) 04:51:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x1000000}) 04:51:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:05 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x280000, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000040)={0xfff}) 04:51:05 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x10a) 04:51:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x2000000}) 04:51:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 04:51:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x1c9) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x117006, 0x8, 0x3, 0x7f, 0x0, [{0x3, 0x2, 0x0, [], 0x6}, {0x1ff, 0xd77, 0xffffffff, [], 0xfffffffffffffffc}, {0x1, 0x401, 0x5, [], 0x9}, {0xfffffffffffffff9, 0x7, 0x7fffffff, [], 0x401}, {0xfffffffffffffd9c, 0x4, 0x0, [], 0x4a}, {0x8000, 0x9c, 0x3, [], 0x100}, {0xfff, 0x3, 0x8, [], 0xd3}, {0x80000000, 0x3f, 0x800, [], 0x8}, {0x800, 0x5, 0x6c, [], 0x1000}, {0x401, 0x6, 0x3, [], 0x1}, {0x7, 0x1, 0x6}, {0x3d, 0x5, 0x8000, [], 0x101}, {0x250e, 0x4ee9, 0x2}, {0x756, 0x480ec6dd, 0x80000000, [], 0x8}, {0x3f, 0x8, 0x20, [], 0x8dc8}, {0x81, 0xfffffffffffffffb, 0x3f, [], 0xff}, {0x2, 0x100000001, 0x9, [], 0x4}, {0x100, 0x8, 0x1000, [], 0x5}, {0x3, 0x7, 0x2, [], 0x3}, {0x80000001, 0x10001, 0x1f, [], 0x4}, {0x6, 0x4, 0x0, [], 0x6}, {0x6, 0xd2, 0x9, [], 0x5}, {0x8, 0x1, 0x1, [], 0x100000000}, {0x4, 0x5, 0x7f, [], 0x7}]}}) 04:51:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:05 executing program 4: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1f, 0x20000000000000) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7, 0x37eb380f9e8fec63) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10400, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x6) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 04:51:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x3000000}) 04:51:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:05 executing program 1: lsetxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000000c0)='\x00', 0x1, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:05 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = getpid() r2 = gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000680)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet_dccp(0x2, 0x6, 0x0) r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000007c0)='ns/uts\x00') sendmsg$netlink(r0, &(0x7f0000000880)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfb, 0x20040000}, 0xc, &(0x7f0000000140)=[{&(0x7f0000000340)={0x2ec, 0x25, 0x0, 0x70bd27, 0x25dfdbfc, "", [@nested={0x15c, 0x49, [@typed={0x8, 0x2, @pid=r1}, @generic="5477c820d1f773dab041b7067cda02a6938952421e3af64e130ec9132db7de10dff3bbb102799f8795106a9c694e65a4babe7e7adfcd85a2fddabe47900ab84f7afcd8c9961e3ba41d532516f7f70ea4", @generic="4f018dbbb783ea96ee68f2f0d33767e8500689d5f0b0e67b5642465d7ca8fb1530ddf7098c807e1d664a5e75a852db91f52cec3551f68f31413653689ac55fbf3ac65f3e44a45ee1318708e9b7549399e0f83076c7bb1f9f557f1a94c359131c15f9bc35eba085cdfaf4f7d8664791c51c3bbf1e6524a1c7ee76a1d9b7ada078f6efcdd7bcb8f6a0ac6db713c7745f46d4617e4f10d1fd39744883dc0d03347d673181501326bc77e7a2c44bfc0a81566679474a92c964d77d01dbc5a204116c16db1a7a8223f935d6cdab9259f3c1f650680b43bcc62fa412d8c2d3b86a396ff7c86bd69ca16fc11200cf07852220847493", @typed={0xc, 0xc, @u64}]}, @nested={0x180, 0x64, [@generic="f1de4ae64f42646a232d58bf3fcfa55e5b666f48cbf77d1c0ff246afe41c7021f781ed9c3c139cd33caf365b34d52fe7d1b824c7d577ce2d6a105ddb9746f606ba1be92a67ef93692296784ebe38dbf41fd66a61bb9f4b93913309c567cf1ba08339aadc1f12d41e1c64b3b362c5d187580781777c3b90f64f28ce767ad54aa4f71da1ed7860d1137e67c5b9c9866baef9e2d6df5214eab5730dae9f57631b98b7a5f34e84c9db834de90556e99ea3642ef5b9212af2ec3f9a04bc3bb50cfa52baf772b4b27bc92f2537c714ff3c511d70b06234297ba12db5cef1b3aa1037008a4582504c041f2bc23eea", @generic="fea43096574607ae2dfdb254c2b7a21752f5f9e31fc9f80efa067dc45af748d8d5119284679d296e7d5bb8373b21d36c86846e3b5a2bfacd701da3a402b14c4e6ad5c5b13f6b171ce021763a89f5a3c5e0e7364cb5fc906c9609d2886483f18f3e05aae12edc7a697c4f21a6800f3d262bcbc7563e52b1c12821834219851ba916781c2c34c00cfc09deab9ce2d019"]}]}, 0x2ec}], 0x1, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x18, 0x1, 0x1, [r8, r9]}}], 0x58, 0x1}, 0x4) r10 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r10, 0xc018620c, &(0x7f0000000300)={0x1}) kcmp(r1, r1, 0x5, r0, r8) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r10, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:51:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:05 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x4000000}) 04:51:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:05 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x200100, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000200)={{0x2, 0x4e20, @empty}, {0x6, @remote}, 0x10, {0x2, 0x4e24, @remote}, 'tunl0\x00'}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x0, 0x3d4f}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={r3, 0x1}, 0x8) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, 0x6, {0x7, 0x1f, 0x7, 0x800, 0x3, 0x9, 0x4, 0xfc00000000000000}}, 0x50) 04:51:05 executing program 1: 04:51:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x5000000}) 04:51:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:06 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x3fff7ffffe) 04:51:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x6000000}) 04:51:06 executing program 4: 04:51:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x104) 04:51:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:06 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000005480)='/proc/self/net/pfkey\x00', 0x500, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000005500)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000055c0)={&(0x7f00000054c0), 0xc, &(0x7f0000005580)={&(0x7f0000005540)={0x24, r2, 0x100, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x6e}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0xc0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.current\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xaf0, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x7000000}) 04:51:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:06 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x4000, 0x0) fcntl$setsig(r1, 0xa, 0x14) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x240200, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000200)=0x800, 0x8) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000000)={0xfffffffffffffffe}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000040)={&(0x7f0000000100)=[0x6, 0x8], 0x2, 0x4, 0x4, 0x9, 0x1, 0x10, {0xffffffffffffff1a, 0x0, 0xfb, 0x7ffd, 0x9, 0x8, 0x26, 0xdc, 0x400, 0x8, 0x3, 0x3, 0x6, 0x1, "390332f920923e248364493ae2f02a6eb12e2c0ed8291eba7b93faaa8082665b"}}) 04:51:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:06 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x8000000}) 04:51:06 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:06 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) r1 = getpgrp(0x0) r2 = geteuid() getresgid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vhost-net\x00', 0x2, 0x0) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000700)='/dev/nullb0\x00', 0x0, 0x0) r11 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000740), &(0x7f00000007c0)=0x60) r12 = syz_open_dev$midi(&(0x7f0000000800)='/dev/midi#\x00', 0x4, 0x0) r13 = syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x2080) r14 = socket$inet_sctp(0x2, 0x1, 0x84) r15 = socket$nl_netfilter(0x10, 0x3, 0xc) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xee, 0xee, 0x8, [@struct={0xb, 0x2, 0x0, 0x4, 0x400, 0x3, [{0x4, 0x1, 0x8}, {0x7, 0x5, 0x5f}]}, @datasec={0x8, 0x4, 0x0, 0xf, 0x2, [{0x2, 0x35e8, 0x10001}, {0x1, 0x6, 0x8}, {0x2, 0x1, 0xff}, {0x3, 0x7, 0x1f}], "69ef"}, @fwd={0x9}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x39, 0x1}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {0xa, 0x1}]}, @func={0x9, 0x0, 0x0, 0xc, 0x4}, @fwd={0x6}, @union={0x9, 0x4, 0x0, 0x5, 0xc8, 0x0, [{0x10, 0x0, 0x3}, {0xa, 0x3, 0x3f}, {0xe, 0x5, 0x9}, {0x6, 0x0, 0x401}]}]}, {0x0, [0x0, 0x30, 0x61, 0x0, 0x7f, 0x7f]}}, &(0x7f00000009c0)=""/183, 0x110, 0xb7, 0x1}, 0x20) r17 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/self/net/pfkey\x00', 0x80, 0x0) r18 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/vfio/vfio\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000b40)='/dev/ubi_ctrl\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000bc0)='./file0/../file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c80)=0x0, &(0x7f0000000cc0), &(0x7f0000000d00)) sendmsg$unix(r0, &(0x7f0000000e00)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)="59a9ae0ce7d1f51c1a807443f6bbd9f0b5130b8523f688a5953acf1a65dd4eb5c9f025c6d44e36106570e13df57d27b73b27a2cb9a00a055b864ec12fce0492ff084f48f186b035803d4fda31d8ed7d9902feae4626cc4ffdf778afc91f1274bddf46633481f2b38e6282b0cf8dbc30c19fca618fd62c88f47d9546396fe4cc6d7a85df29d9a2861fe175fe3e0c9d224ba2f931a93d3e2b8f877956e75d30b4fce97dfc5f9743a419b0be4e5561312559da5156b3b46d042e01e8ff325263cf23bd5ba83a3f5b6b624ad366cc177d39243", 0xd1}, {&(0x7f0000000340)="103ad93d19f63a86303e7cb83cfb43fbe66a58047f69fd6025c4deceffee6544e7bfcbdb8ee24f75a6228bc22a1392cda5bc05dc0da6634794133b8766518c3beb3e12b91038f2ad1fd3cc6e5281c2b6740a95f42b34b3e5aadf03252c5ede484c1b93a3fd19c8fe8e0150cd7f", 0x6d}], 0x2, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @rights={{0x18, 0x1, 0x1, [r7, r8]}}, @rights={{0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17, r18]}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r21}}}], 0xb0}, 0x20040000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r22 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x10002, 0x0) write$FUSE_NOTIFY_RETRIEVE(r22, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0x3, 0x1}}, 0x30) fsconfig$FSCONFIG_SET_PATH_EMPTY(r22, 0x4, &(0x7f0000000100)='nodev)selinux-}\'-vmnet0/\x00', &(0x7f0000000140)='./file0/../file0\x00', r22) ioctl$KVM_SET_USER_MEMORY_REGION(r22, 0x4020ae46, &(0x7f0000000080)={0x3, 0x2, 0x6000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) 04:51:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x40000000}) 04:51:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x80, 0x80000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x3}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r2, 0x0, 0x6}, 0x8) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$KIOCSOUND(r3, 0x4b2f, 0x5) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000180)) 04:51:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:07 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0xfdfdffff}) 04:51:07 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000080)={0x0, 0x6, 0x9, &(0x7f0000000040)=0x40}) 04:51:07 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x9, 0x9, 0x6f, 0x1ede42b5, 0x5, 0x9, 0x10000, 0x4, 0x7, 0x7ff, 0x2, 0x2}) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000040)={0x2, 0x1, 0x7fff}) 04:51:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0xff000000}) 04:51:07 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:07 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x80000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000100)={r1}) 04:51:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x101000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = fcntl$getown(r0, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r2, &(0x7f0000000100)='ns\x00') 04:51:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0xfffffdfd}) 04:51:07 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:07 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x38c4000, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@afid={'afid', 0x3d, 0x1}}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@access_any='access=any'}, {@version_9p2000='version=9p2000'}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x57aa72871df78f4b, 0x39, 0x39, 0x62, 0x7e, 0x35], 0x2d, [0x35, 0x62, 0x37, 0x65], 0x2d, [0x35, 0x36, 0x7f, 0x65], 0x2d, [0x30, 0x37, 0x63, 0x62], 0x2d, [0x62, 0x77, 0x35, 0x77, 0x39, 0x33, 0x66]}}}, {@uid_gt={'uid>', r1}}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0xc1c}}]}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000400)=0xfffffffffffff801, 0x4) 04:51:07 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x100000000000000}) 04:51:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:08 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:08 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101002, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000080)={{0x4, @addr=0x4}, 0x8, 0x7fff, 0x100000001}) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x200000000000000}) 04:51:08 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0xc) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 04:51:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x300000000000000}) 04:51:08 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:08 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@null=' \x00', 0xb, 'vcan0\x00'}) 04:51:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x400000000000000}) 04:51:08 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x204240, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x500000000000000}) 04:51:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0xfffffffffffffffe, &(0x7f0000000040)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000040)=@nfc_llcp={0x27, 0x1, 0x0, 0x7, 0x0, 0x4, "ff11e00fda2fdb0c1abcbd4f695401c7b5b4712d7fa16fbc55979cebd79c4afd3d3127a5ace25715ec27d7f6ef2998e9b49624f615196a896ec6f580e87ea7", 0x3a}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:08 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x600000000000000}) 04:51:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{}, {}, {}, {}]}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0}]}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x40080, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000080)={r1, 0x3e}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f00000000c0)='./file0\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x880, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 04:51:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x700000000000000}) 04:51:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x800000000000000}) 04:51:09 executing program 4: ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000080)={0x1}) 04:51:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400000, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:51:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x4000000000000000}) 04:51:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:09 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x0, 0x8, [0x0, 0xffffffff80000001, 0x3, 0x0, 0x7fffffff, 0x3, 0x0, 0x0]}, &(0x7f0000000080)=0x18) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0xb8, 0x6, 0x7, 0x10001, 0xffffffff}, &(0x7f0000000140)=0x14) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f00000001c0)={0x1}) 04:51:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000005600)='/dev/dlm_plock\x00', 0x40800, 0x0) recvfrom$ax25(r0, &(0x7f0000005640), 0x0, 0x6dfd5907c5ddfdf4, &(0x7f0000005680)={{0x3, @null, 0x6}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 04:51:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0xfdfdffff00000000}) 04:51:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0xff00000000000000}) 04:51:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:09 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x109000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x3, 'vcan0\x00', 0x3}, 0x18) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) fsetxattr(r1, &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f00000000c0)='-zkeyringGPL{md5sumvboxnet0\xaa%\x00', 0x1e, 0x1) 04:51:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:10 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)={0x3}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$setopts(0x4206, r1, 0x7, 0x4) 04:51:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x2}) 04:51:10 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000040)) 04:51:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x3}) 04:51:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:10 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x10) ioctl$CAPI_INSTALLED(r0, 0x80024322) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x4}) 04:51:10 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:10 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001000000000000ed0023cc2dac20cc6bd6e0000001ac1414aa7f000001"], 0x20) 04:51:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x5}) 04:51:10 executing program 1: getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'GPL-[^\x00'}, &(0x7f00000000c0)=""/222, 0xde) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:10 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x6}) 04:51:10 executing program 1: kexec_load(0x0, 0x3, &(0x7f0000000100)=[{&(0x7f0000000040)="794af8c4c44b5d", 0x7, 0x1, 0x9}, {&(0x7f0000000080), 0x0, 0x7, 0x7}, {&(0x7f00000000c0)="3fc0b5d0a33f5dd0", 0x8, 0x200, 0x6}], 0x2a0000) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4000, 0x0) r1 = request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='\x00', 0x0) tee(r0, r0, 0x105, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001340)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7d2e, 0x6}, &(0x7f00000002c0)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000001400)={r2, 0xadb, 0x5c, "7d41791ef04c1dedf598680d216051620f856f2f3e2065370064f9e2463a4d2b2d06b4205b33001cc4743364a433d526fe1d2ae5b4f837e3e6f1edd1d46673d1a723987d2c61c63e286fc296b4ed15e989a88307b23576c2d876c8c7"}, 0x64) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000240)={r1, 0x28, 0x1000}, &(0x7f0000000280)=ANY=[@ANYBLOB="656e633d6f61656f6a1825515510a56672696300000000000000000000e0000000000000000000936a4c8d000000000000000000004000"/64], &(0x7f0000000300)="91180153b57a86a5775c5463fd6dbe8c4d85d69d35de66a9b66457f913c76ae946da24af62b7a637", &(0x7f0000000340)="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") mkdir(&(0x7f0000000000)='./file0\x00', 0x1a0) 04:51:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:11 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x345080, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) 04:51:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x7}) 04:51:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x38d, 0x101000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) move_mount(r0, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000140)='\x00', 0x4) 04:51:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc805000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:11 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = memfd_create(&(0x7f00000002c0)='/eth0\\\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x400000000008002) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x8fd\x8dx\x001;\x00\x00\x00\x00\x00\x00\xa8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x8}) 04:51:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:51:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x300}) 04:51:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:11 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$RNDGETENTCNT(r0, 0x40085203, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x1f, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x643) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0xf3, "0dce4d4786802f791b4e93e5cd52d4b55f9834aa3b3a2e5dea949ac082353db997adb532359b257184ac20a1edf6b061ae227228c526158af6219ec24f4ce66c71686cbb0ff111eda68808892d47c8f6d94b4421db37bf1c3425079d4f051d58776ef8138f6fcb09d58a4b6edb0d9759ee63a1e43ca5986681e08cacc70bb96bd4ed1a4db34bad43b6a74e1249e0c8f56d0c798d50552f0fc6b3418dd1f53a054a7a617f41ced5df1ccc432a0d31bd7fa1ddcaca4f916dd5c3b12cef740733254a149421cd07b8ea6cd0330242789d2f60d5f1f82c7bcf6193162fc1b55a3a3d069e24ce0013a9da1118c80a509df06740d005"}, &(0x7f0000000080)=0xfb) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000240)={r3, 0x7, 0x2, [0xfffffffffffffff9, 0xfffffffffffffff9]}, 0xff94) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000280)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}]}) 04:51:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x18000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000080)={0x2, "f98e"}, 0x3) 04:51:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:11 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x500}) 04:51:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:51:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = shmget(0x3, 0x1000, 0x200, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 04:51:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x600}) 04:51:12 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1c, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 819.649340][T16360] EXT4-fs: 9 callbacks suppressed [ 819.649351][T16360] EXT4-fs (sda1): re-mounted. Opts: 04:51:12 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x10000) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(rfc7539esp(cbc(des3_ede),sha224-ssse3))\x00'}, 0x58) 04:51:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:12 executing program 1: r0 = getuid() lstat(&(0x7f0000002d80)='./file0\x00', &(0x7f0000002dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f00000007c0)='vfat\x00', &(0x7f0000000800)='./file0\x00', 0x7fffffff, 0x9, &(0x7f0000002c80)=[{&(0x7f0000000840)="c9533a550a935144aff70927a494820849f0d293385242b7502044025a5bb4f8a85130dc0aa10d74259b1a5a43534618dbc8b3e633cccd37ed22f7b410f0447fadb20bda46ef6718cdd34c5fbd8547147e94c45e8076471fb3e9448386ef4e705da9458852a0955337a13f12f2e50b7930f85055dceb51580d66c651166f9b6fb2a94511b96054cf42db23289ad2bcada272f00e2b4c23dbbecd43ec74c50bcf6b71423cf8dfb9467782538f466023aebd2e38a7f7ef432488a907ea073d3f0d174474b0e0a465610e4c5fa51e049fb31e8b81eaf58129f186d8c5c0d0651fc9099712299110b755ac7bae14d666cf301ec8965451a30a8a572883e656a1749d463b8a9ad5b05d56cca1247dc097c3686961c88c48dc5dd6236eda38a1ec71f4a816ab6a5ef0b22243a2d1131db6d9f571c7427cf9f797a5dd32bc7baca562cb880b06d34b6acd3130cf6831023b1d4b33cd0e3edb62b3dc4c32778034e483653e6348bc95645c380c84bdabf658977108dad6a74e90c80515ce552d28db6eb4fd38ab86cb9fc4c821d5981c5c9e00ef95b22f3d6eda0d4e75ce9cc9a135777f74fe14c8ba63ff40821492006d4e383036a30ff37389832264ef61553fd2c0994d2242daf84f0a66cf839e00c09967834523302a3a8552e5c04fe776a048e24007bd04f61df3345d9ceb6406d7552b2a850c09a4fad878bb36484ea8a226b25fa93896ba7a3a0d2cdd2fb846bb774179da2ac6e62456bc8f67eca251be640a11133202f8c44dc668ab65d0ac7f756e98d362e91d142da5b095f4e1a7653a8e30d6de376290e8c4181a6589f8401b0e6c533b84d111b9632ad3b0479439a992e79f6e2319d22ca762d355591c14b7eccd5611f6810fd81bad5951861807aa503fc339b7e0485b05eea0302999806ef44a7cb01ede5399d6b1ea188aa80ca11eaea2a18d752cd6f3db22c12d5a4fe949f613395c953e0182b32ac79719efbcbe96da7c2b629409dcbbc4a401533a4a4cf1929e781fc64aa818cd95d4b46f5c09192d8b35ea8b8f5595c0e47782485df685b2f8cb304341cef22adfd8d9cbe225979cc8490184b41ef03e89d89509c6d46f8ee1df8daabd5e95d5e51abf84fb8558bd4fdaa68b89b7cbdcc792c0565d17289d951df87aed3f4c417026a0129e3e782fe68c7b2ecb83512c4309b70e356aadf86c3388059a721b409e4cdf99b4b855a8ddd559816f102fcbf82d082bfc11fb4867fa6bf52f02cad0ae8dfb0886ab95e4017c5572c1fa5f4f2b64a4cee0a0c10705b6b0d8df01e2205dabd53fe33a7c5583846a4921ca078153498ce42aed517cb1df68d8e0b23f0d9941623ed24e88595cf5f1f99a3a8f38e8738d71862ec771b02379f35d0ef2891ad1292ea9fe49293e2443be8a12c9ee65b23153704b9ecc5cc9a4c598decb635dae18b7c0dc6b83c7c0869342815107bddf462704125c3aacbcbd8a07d683dfa0df1767c9602292d0bcd8dcb4242d1974e5da59eb7ecb7cee79152cdd6f781ac43d3209399d1fe5a18c3aecae4adb38a577fef63dc9c485398a8653a687b99a7aecabdec09413e58e27aec213c7504bf9e50857db2d927f6ec3f9af3eff781c6d49ec6c360e252e4b60bfb9bc98ae30a05a0d70771e7ff7cd1f908317728f5430d3cadf5d1176a03e6746999cf81c48aa55ecf04e4f8db8da559623ad4b9db7c9e7823576128cc09fcab1947f42869567b556192ba0a49950de05ca154794e0bf007a38c2c6f10028916cd5f84baf22b3b3529822f37bfa481d77dd943cfde1780dbed3711eee3f59d2f57bb973008c91b7fd0101b6f0a4e05dfe8815f6ac199fd6cf02e69aedd8650e50c667c39b28e1f31a61b4bbf2c10aef822385cdf1c3ee2854366205ac56b2d904a582722f5d9146868f00be5017b1d1cf7cbba175ba117e43e01bd4668ccf3a0e3a7297c643720ff571b33022f5c51cd16c21a89d3665b86904dd34ebe159154e836709db3fae2ea049845fabba4b44daadf809da1f56416dabaef04e6584484d5c06699ed35de8e1ff490a09e3d4c66de00cb838ba958aeea0a9a4f76b8d33d60634dc1795e5d1127f46725bf3ba0bbfe1974913342362bedcc5c184a615a650c7c47597bf4563ce5bd884cdf7b6d9694cd7db6c0ccd88f335d29f49fe7fb26798a79bbe502b04f2e9c0c39a9f1fc2aad52df9819acef3f6cf508a104d99d15799c2a42e948c2d485631ad0b9dfcdf02add5594db5f90b22c45ffee431e54eae0d354ebb56761f7cc58201d2081f579e9d834dd68d0baafe476c6b4217d8386512fe0ca9329a57a647f3780e12498cc51611f57666238977bfd1d5c3f3b19df986904fc2111b40115582a8b1d95b6f412cf2df24a07de138d9e6a3444d46863188f7d3417f965437aa75737587f00a9bf4e4c00319bf09c6a2935df0980b828981a75d04329f9de1cace3c23662e87e31405acf985dfd13e498d6ba0a6537ac57c7a457ab48f30d236fb45b852c5a629683953c9c8920f432c6c4f240b5ffd730644f3241662ba7941856057235316d614e445538837ae3968fb4c833a6ad1572a18b48ee850250d2270f423612b9f9c6ce15785ee9406650a1c22ae332e68b5faf9847b00694ca345b8daf82c4f5d2b42493330336435f2eee370412cda15d2571184da674508ab00fe5d0f2275d7c07b08aa264808695a8ce1e051742199522ddaad1d575a3eeb2c7ac497cde334c07e538113b03a7076735b2ffe63b36014c49e223db6e60471399836bbf61f1502ec2a6d8e53fed935537edb0044c2fe450e8bab047629b57a79d2b653b6b5ddefaa2945936aea09a2befeba1e7d7b7d0a4b1ee1eca7b4801bc2a83926eceb2d27bd855464d0f5fcdb812649aa3d9b120330d2d82626b0740e8c367632f9d2cdde7fbf7daeb9a0505b22e57dcbe5572a1c0af1fcdb39594a2d80db56403e462ab2ee742ce8b14b0e01d3e3f49a39077c6660e17916ca5263623e8eea1a650d98b48cd6659149885d8276e501d978dfb6f6d3de08835c38561eb2b27e1060ee85eb0051921fa85b3bd8fb8a0eaaa9f4cc708320373eb27551bf8b3aed7e4d5423472786276217627d024b2a5ff67d1c9141f6cd0fd889cfb635f8752d371ebb51fe981174af4860e54cdda4db4e932e842700f9d39f29aaa42129cb8ded49d08815570302122800a1754c4f96aa0553ae637ff9eb56aeaafb5e2566af9479ecbda9fd2b42816a89ed5a0166ed866d721cb61f91c7d4fb252ca650f59bd19a473706e8f1d6f1e62f7716a2ea270e3e7b5b4e85ddc4af4e57821b295e09e3fa6c3b3e21b7ea81bb0b9893bbec7bfd93b90ba62d33eee078e21e44fc189c465fe031e5a0b4ab41a9da958fce8db3f67962809ef980fa7cf303029f07d63c252d8eb5cadb193290bb0a71bf1aff36b87a3145af04b4df7a6fcd685e48f0ae70d548903852daa525d2b9db5bdcaee921acb6091e41ac0227cc6406c3ba26238c45da48d48b2afe423cbec2a51969b65912348da90f1cebdcf4500ce54a3ab3fec46aefff30ab1f1ca8920531020a1c010fe323b6ef0421596d66ebcdef11e6638d39142cb7010c9c901f206fba54651347da0181482068f9686ffa26f23821e3a5827508e18c201ad3d45b80252cf5e094998d459293f54c1b9baaf1e9593dddc31b6b0578cb702e9957f9411ae47c875e7877875d02a492353c265b3bf51268e9c1e0c92b8298bed675bea06b46c2d9e172e461b778dbd1f21de822c644c0acc84640005e762fb41d445e248484a1227d58aac0bbd7f56bea0538f29a713f74fea5e43323309d91c67ecf3c413c8be77752aef11acbf17077361b19eac7c84e2e446b96f4a73d4cb029e67ca8bcff9b6bfcd11bb393ae5a7a93dc7557977a1748971f8efaa13c94373029086f58e45cf290db721f68e9d191f952916bf0886a56322a4b3c166739bcea6937f74f0763801f7b0bfac6d9956c475519e4e78b84cf99d89992bdd0b05a4dbbd7cace87b5122aaa7602b52b49c578f5844bb21a3eb11daee54894a61d4dbc10f7407f034231727feafe64211fd895b61ea8ca78f6741c2175b2a0840e1b229627c1297c7fdb0678ff5af25793e4031c0f9506185d211878cc528d6ac10169348b0cee53fe282394c6dd22257d0ba05f88828e689c8fb997cb78a558b1768299f4de166ed22e094b126711111673e4c3cc54de83eac8a9374fa5c50c9a4a0dc6eaa69ebd42b1afe36417ee23314fb2c8ee52e5e12d2921c6ac35e5246965ec52f7748d50f5498e472442da1cab62a08f71f91dc9baa483c92d4dc58dbc8b6d552f3f5511342060516bf73f3e349dc2ae235d1adb4d3ec8f30635f80916532eec6e839b419db85c42e7b67d99c501663205127dcc4b200229db2121d1d4dccaa9f88e68b42921d4d39ee96aee13843989000827e3907b459f36ec0b00b13ef90471720dddc0d0759d6a951b99ec7d15498960e30d2202500f598c7a0c2a683f83413b8ae7acf7af5d0b6048d9855dac5b1de449cb171a93280c914e50bed505e1796dff15c7140640f4ce1c388eed9cddd5e9f17e58940ed27694ffd0e78b31842e1217b7645cac0aeec78097ffb8332f8c2e674a8588f2af41da46a34175aed74d72f4085f85d4e282832a510e6f9ddfed68b3024e9a2ec26a54e06ce22a31dcd0ae8405400d5374e3f83e3505f3a6863ff608a440798cf64513358bef5d833f56df5db646490fe3a69ae35384aa30a34406fdb28935d8ea3d89f212d1f62a6fa25ef7dabfdbfb7449430bf363cd2f5b15e817d20b5c4c1f10b451a3abfded70814f0f8b63aff75199fdc6a16cf99312e958fe92ad59a80e302766cbf33a38ed1357e8981f4cadc7110eb8c4d1a25ec3cef455c898c9a694a69f066626416ea39b9de78cfc89997e2770b36d29538c248943e6f58ae3367cf394532a53b183c49efe6571595e0c0e2d69eb92b4eaa74119352a75d97dd5785d7b31429969edbe3b7a816573a91db98c6300c3afe1d5365adcda9097181da05a28dcdbc7900891bd03d7863058e540297c65f6dfc6edfe31ae316ecde944a21aa905d98012b9902dddb44a55ef5cf00d343666dba22671923cc18be06810bc198cbe4db871fc2718d256f3fc187cfc2d18a59e7472859c68c027b27e42a529c20ed1c77ed0225e9b6afa4cf36badb8174ff385406eab11cd9c2b5cc92ba3fd869207ddf59be50296849a9c4a099c8fc4aec12bcd5a6d3eff912333b8227688e832e08ca09c4c575237a97eea6c9c447d108d19ea60cb6eacc38078074228d06a337164ac2258fd979721a6c5ff81a0120e2e3fa869fa0c25810b8773aa6d669aa87515fbf36de87ca31cd76c88dae1d8a555b69f46c40aa38546997f07d12a4bdab4be99b4c24ea459f2a2a49e59116e76606ac8646dde7baf822f1a3f2b5cd4294c4c82114a1c10496695cb7af4336a9a410591b34245bf942839d3489e9ecb54d778db897974e486442111b44a924043ddccbc5550e990cbd5a48d2adae7510e8488c8a54f554aecc668bfd2b789220043d6ba25576255a30e3ac57f62f3cb4cdae2e3c4ad02f02a5271a6d90f49986ae58c87253e2a08933724d123f4d918b7c09321f8ca0f9cf66be30fb497bfccf325435acff862406909b4db368cacf9ceb33816d8d04cbebb4ee427fe93c1ce31d4dd5d403541559629ceff6e0eb2c878d9227ae0560d630d1a2bd421717e75526c47b859b73cddd16cb5a0121c8180de0c7cf70dea60a88a114322", 0x1000, 0xfff}, {&(0x7f0000001840)="d94c928a4f7c85da1a4ca6c2a1b41b4b290cdde120db8d274d58c5c0bc0137295264523bbe", 0x25, 0x7}, {&(0x7f0000001880)="dcda6f7e727dc041fa9be2f0022b01cb178659b1c0d350bf17db3a2e54a4bb1c1ea55cc5e70eed675106fc736a0363b605644eb6a380047b5b94520475d13228d9c3e974b6853f09ee642a22706f2802b2b58509353f3eb2b532dab69628d556b79dfd834d57fc5e86333c4e1f22f2be553405a69432d0c3a8ea26b4dd59ce9dbba4147c2d93cd3ab6fd2089eea3fcec54f4a7c2e99ee8e918180f", 0x9b, 0x80000000}, {&(0x7f0000001940)="42cbc6f03274d89cfdd2608aa3a77de71e559e8741d24d4aa95ab155df0de305b00a73875056213d569a910ef8f6dcc27c9623280219854ae9f02c0c63f4ff6a2271e4", 0x43, 0x3ff}, {&(0x7f00000019c0)="01491d15584f8ee8699486fb8de8013bd6b7f5a412cf076f132bc8ed83cbf704517c213389150206da7aa2b41b4e05b58ab03b1cff642d4261bb7a933fc31b1b87e709caa362be6f966c4527cf3f2db003877699d3b4c96b11270e4637df6c732d6b772bb975196743c1adc8c03bc4ff7a8e3ffe7e1ac683d3c6e72449d66cb32373f34e6ddd23d202145e1635703076461eda54fcdf1f962b68bcdd3d0059117376c96bde8337dc757b7d827cb9efd7cf37b854c5dac83b5bbff21f149485396195efb76e4b5ffe140497cd76168a211dc5a047f7", 0xd5, 0x6}, {&(0x7f0000001ac0)="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", 0x1000, 0x4}, {&(0x7f0000002ac0)="56e34cdbdbb06c1a80d5a6fa95b272b6c2909da2d5e7b878d35d287e1a100395082e2d4c2be58cdff0b48324fc8ac7578931bb146378462c70e709aaf0b49f6ab6baa36d040c8f98e8a2ddaa7a99fd35fb6516bae3ea0a828cd6ef54fd19911e3165a0efc94d792872a7b9d985935ede3c4315709b4134774505b0c9027b5bfce4e99f422caceab03b6d0e4a811ec3558cced26412a5274f59524337667f2e7cf291429b", 0xa4, 0x4}, {&(0x7f0000002b80)="a24d2604f083e4c4367e602e5acd86c693a8141d772c3c3c1d45a57829550a8119e0fc31363af60d0f55b99dff797bf7cedba1b0a4638767ffde2cd7313a66e869a765f4e7bdfdea4c42258002816597d83d5c11b2941074ab77a81cce78456421e279b5e3360c4c3c00740469da2d10b60af0aa7db994e4fc61770c385d9c855cddc1c497b04e20676f1d0ecfc37d37c9f1424b49d98f2489c46d0ba2a6337117aac8356145", 0xa6, 0x2}, {&(0x7f0000002c40)="96661497ff42b815a693f3aa3c28eeb883ffc3f16d46eb5427db02a47057271778dc318f0b058ba5ac2e1a6ea0a48495f392dea52efc580b01", 0x39}], 0x2008000, &(0x7f0000002e40)={[{@uni_xlate='uni_xlate=1'}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@nonumtail='nnonumtail=1'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x3c}}, {@audit='audit'}, {@measure='measure'}, {@fowner_lt={'fowner<', r1}}, {@appraise='appraise'}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/5, 0x5}, {&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f0000000180)=""/210, 0xd2}, {&(0x7f0000000280)=""/130, 0x82}, {&(0x7f0000000340)=""/186, 0xba}, {&(0x7f0000000400)=""/169, 0xa9}, {&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/62, 0x3e}, {&(0x7f0000000600)=""/28, 0x1c}], 0x9, &(0x7f0000000700)=""/109, 0x6d}, 0x40010000) 04:51:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:51:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x700}) 04:51:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x4000}) 04:51:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 820.043862][T16535] EXT4-fs (sda1): re-mounted. Opts: 04:51:12 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = dup2(r0, r0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) 04:51:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:51:12 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0xff00}) 04:51:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:12 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000040)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0xc, 0xc3a8, r1, 0x0, r2, 0x0, 0x5, 0x7fff}) [ 820.346901][T16720] EXT4-fs (sda1): re-mounted. Opts: 04:51:13 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x8) 04:51:13 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x1000000}) 04:51:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 04:51:13 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8401, 0x10000000000000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80000001, 0x58000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x5ded}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x0, 0x9, 0x280000000000000}, 0x10) 04:51:13 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x2000000}) [ 820.865250][T16954] EXT4-fs (sda1): Ignoring removed bh option [ 820.898004][T16954] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 820.898004][T16954] Contact linux-ext4@vger.kernel.org if you think we should keep it. 04:51:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 820.898004][T16954] 04:51:13 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x16400, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x9, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x20040, 0x0) r0 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x18) r1 = openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) fsync(r1) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="a13bd707976046c585822123679d3de049155f4ca3626610e244699a2b9ce75c0b1a9effcd53533c3d8d7a9685f37a62b16c8b4492cbfebef1fbb50f3d61aa4972f97aa64435c891f5a1c216ac7ddd0171dcf38355282e8afc3617ccfb012d19d35c14d768437de7e6d1f57cfc3cce59ce660ec5a4c3d51c6a4058a75471a39c3195da8dcfdd17d831d06ce99318ad5688feb1c3a7fd0ae43d474e7f075a67bd0b9ea33111dd97650b05368a5cab88adcb5ab80bfc60e0b27a20dfc371b7ed4d7962bf8ef8a00f6938ca607caee223fc150f6c00a6ba5b2ac2", 0xd9}], 0x1, 0x0) [ 821.019217][T16954] EXT4-fs (sda1): quotafile must be on filesystem root 04:51:13 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x3000000}) 04:51:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:13 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x4000000}) 04:51:13 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000080)=0x4002) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open_by_handle_at(r0, &(0x7f00000000c0)={0x80, 0x0, "2223ae8c008a42c8e0fa8a459e5e6f963e739db7bc870cd044a3d530d25c37efa58b91e4c5cf3104d9436ebdafae7478cafb580b05bffaa6d5f31794a39791cecc72c35bd6e320f46c9bf3efb20e8b40973f9e2efe5e9b095b9fc6088d42a3bc974c99ccfa9504c5f370651c36a4fbf107ebf2887828ee13"}, 0x2000) 04:51:13 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) fsync(r0) recvmmsg(0xffffffffffffffff, &(0x7f0000000b00)=[{{&(0x7f0000000000)=@ax25={{0x3, @default}, [@bcast, @null, @netrom, @remote, @remote, @remote, @remote, @rose]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000100)=""/70, 0x46}, {&(0x7f0000000180)=""/211, 0xd3}, {&(0x7f0000000340)=""/139, 0x8b}], 0x3, &(0x7f0000000400)=""/174, 0xae}, 0x8}, {{&(0x7f0000000280)=@hci, 0x80, &(0x7f0000000800)=[{&(0x7f00000004c0)=""/176, 0xb0}, {&(0x7f0000000580)=""/189, 0xbd}, {&(0x7f0000000640)=""/170, 0xaa}, {&(0x7f0000000700)=""/70, 0x46}, {&(0x7f0000000780)=""/105, 0x69}], 0x5, &(0x7f0000000880)=""/36, 0x24}, 0xd0c6}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000940)}, {&(0x7f0000000980)=""/43, 0x2b}, {&(0x7f00000009c0)=""/34, 0x22}, {&(0x7f0000000a00)=""/129, 0x81}], 0x4}, 0x6}], 0x3, 0x21, &(0x7f0000000bc0)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000c40)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000d00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x4804002}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x30, r2, 0x600, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x24004000}, 0x20000000) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000940)) [ 821.365603][T17296] EXT4-fs (sda1): Ignoring removed bh option [ 821.371991][T17296] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 821.371991][T17296] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 821.371991][T17296] 04:51:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:13 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x5000000}) [ 821.475546][T17296] EXT4-fs (sda1): re-mounted. Opts: noquota,bh,nouser_xattr,acl,data_err=ignore,jqfmt=vfsold, 04:51:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}]}) 04:51:14 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x20000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 04:51:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x6000000}) 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$sndpcmc(&(0x7f0000002a00)='/dev/snd/pcmC#D#c\x00', 0x3, 0x200) r0 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) open_by_handle_at(r0, &(0x7f0000002900)={0xcd, 0x5, "1f56cf8f680a8576f9123b5a0fe17393224fcfc84a5673e3c31998b6f997b6a7775f8635e3bcdcdc0bdad1ca8b18aab6ef036711dcd6999c6f298736265a0ba0d1eea76a1d9634c9e4997552b02483e4da812fbcc8b302508d91b323974858d0e9a23f91cbff3c5febf31850daf7da0e5836c9ebe09ac7eccf01116bfc58ceb5d64a3c1e03e40bcb2a0e1ab686f1c7728d39c4bbbe8134b7a4980f37299f1bffb8c4519079f1b1daac238f8e8fb88d127b9679e2ff674206f06a695c11c907ad38f0c3cadf"}, 0x8002) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000002c00)=""/165) sendmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000000100)=@xdp={0x2c, 0x5, r1, 0xc}, 0x80, &(0x7f0000002640)=[{&(0x7f0000000180)="5c0edc0c3b87227f97a6ec75ea4e2ca11ae2c2e7c65d4a4b6f242bebd9037b73167a413d7e7a0699a3323c934e3582ef46da89929afaed26c4181b4fe8c300c7bceeb45f12a52e69ae6f8dd99b6fee68fea10e1e899e2ad7f7ab47bfae7374f8a9bd6cb8cbab859f7bbbb001cd9e8c7eda5f4bd36362f4a03baa8b498cc1e731db149e5913eca96e34d241b81d771f33e10c65fbe059f8d2a6d0e878cd0dd6cbf7496ed1051cc1bf5165fcd9e9a4b4255530a50acd799002662632eb21fe8b031b03f74f2e45786d1efd1c687598041a743ecae6713ab208b414206734e2e0d0ed80a3480b10e0890001ea8a86f7d035607bb5f4d56a982422bb2dddb139ca5e88b315c967640edf1df405375ba8eb139c01d2b229a6c77b27eb178f111be4072eeac0dabff82db635023cd84161012d36bd784b22bbc25419ab8da4515ad4262157b720f8a50023b020c3a4fcb41db8d3b84e94118dc60e2c20267a2615d2adf6f7411d88c1688b53a58d6bbcc383e1f84f78c8e38e0037fae45c251ccfe9fa0b4922b8d0057b2a365922f1763221b8313496d4e32638ac8edeb8a373c54f85463b85881f8ee5f95de998c9725753752a66e0ad45a2d47e475d36407cbed587828c204a965f5e55d2982a0b2f90bc3ab2907cc24b86517e2c19a4f25c8d2da7b2050d9658349589ebd4088c0228d292de78c03a88a93edfe89c0a452a4cff5d7703374d406e3693b92680204e1655000284a51db45aec86080c07ecceead7971185b31b687b4a9e3ae3d6887567622174ae64da1a86e28223e287c2cc833e27bafc09e6ad2e118180c942f4129a0c20f86cd7355de246f8ec19219d29018b79c7afc5891c340d5db4189510c953b6ed90b9de087ad20dd8af7f90666e38379a5c3a8df643e928a46a3778aa5b9fbf30d494dcbdb3be2c3f4252a90bb477fadea6e594a979128fe71c1bb75412612d4e27555a0e264a65dda4a4a8473de750fc33961fac58ca424f39f75f04df093db0e6ce6083ad8a009a005de1b6cd17c2974f50e98faff4f486516ed1c1697cc10eb41801edf051073c59d44dd699d9f4c9dc4d4ac6574a699045e476f4eadf72548d1d0e05c7d1719dbaeb12a21fda1a7104fad3d3622cc70b8424757d84d2044cd6dc6b25561a84feb25b4a0b6b553750a217f76feafa10e3830d6d0dba9db99ea270f1df514652333cada7f42ddcf994d30d363f996bc164edf2507c451415287a9a61ee2fe4af3448cca7a72cad5ae4d750939e00a88942daec58d2c870656d58d585afb2053e4150f7dbc9052fc5e0878cb5d563b3e1dd5f05f7a6bfd12fcd96f47aa6364020bb084296de6ae40f24456873e3cf8fd5b983310f650bc0c8494cac5f023a59023d34961d7bd4c90448fa0986318928b436f4234e58e9efcff3cce525ccb6e7a182640a114587b901074a39a0217cd54b6425f29dc02eed4f1e2fbdfb8f692cc8b0ed7c25f2b3c066f5e1ad67a46426274335e4f74132db14cc0280bc1f59b3abf4242916d10bb27ab752e472c459eca36fd3bbe74d343de816c863527f1929daf87f8d53975ab9fa31a2dabd314d88d90c5abdcdf50a83ddfb19792aea9986f2c970f4df1f671dac27ad2eb6ca6a7a83ea181f541d0f8fcece933b2bae24e32bac2461af255606971f6961bc33dec387be0a93ebee64114fbd4d5fc212b7aaaccef781a320a84b4bf77c5c7e97da449dd5d49e535f3220d19fde2371eeb6dd67853913987e9d425a2483daa2a2ec62fd6c74ac41781a93f9d8dcd7c63aefb667f7899e2f03d0e3cd76d9608f9fde45cfbd9e1c5f24a6b407295ca547c66be2b3ef09ce3adba77eea83b54f6a535aab7b02a84c8004fcf0714dc34231142f64c127a1179bc559f473641ceb106b134e3afd62f6ea804eccc02ecf53d262166128fd43219181272807c5631329aaca82b91fdcf5823d77cd0e884eb0df8503bf2593f86c5fedd024f5e1f6ed4d8d17609177ede67263f16b6a830319530ce5ef793645632abf7346df70e68baa15a935c6aeb9916f69c20fa53a8f5a400d7930f6c36cb18719ca5da523cb839f5b7e780e99c047fee935bd73c591de4bad7b8a78e6a17c46800c8c05a9f072c172963f1f427191e661ee03afb2f9098954a82aa44d644f7646a8df73816592ac29eed193c7fd8044eed400b0646a5306c6dfff01d80034fbc909b6d94d91cf881756419b36211933459b70c8362f1451a4ac5de8b098c5c854ce00386c564a74ba3ce39bb64bf07085b428e8404942b8c753b5d19e07733b723a50d40a6770744e3861c64ef0e1e1bf6e764737835ea392d69333a79b02e835fedec2f036b55544ac2a025b78efae92c9e5f0f762b20ca741c354b6a004b87e166c23bc6776deadf8895e4cf12cb05ffd5c5ca8d4390bc33f832d463c0d29ca23bd4047154d8c8e95523d51813aa7919da859bf9df56d38e170427f8e9f676507e1e420f447a9b628ff749105f69a550fdb5b99e41b20e655c2ec44a320b63c6886221914b63c68182fe9aee0503eda57f89dc1e127a563d39aa08a49a0a1ed391ff72dc0e9eae10a7cd4d67753932deadb56b77103bd3ff4bdc6d449ba97d187f6944b10d1b73d07aac95c5cda3ee3e7c7d915431d846471a4db25547af34068829ec2a1d9e1960c23736fbb6798e227427931b0af37e030ec51cf1d2abc883e58f9fc86edb2fe3e5295dcf41c06e425702b863368ca84a86d52a47214b507873c490de2731e20f57bc0b6ac8b85064ad69af30f39d9f40f2186a26d83aed7870422c0bcfde3d546f8a30a3cbe4ba19732468ff8f4d3904ebbe635bde02777b6928a4facea83859973e73065000358d17165e83948538ea5a135baf430b60d9cef4c42248f31c91b1c71a6d6138a784c0dc1b27355c3b5980ff3565f68690838fd1c6844808323dce23361d2488ad6abade5880c0b96666b83637652bdd4a0b9f08446293375547f13ff3765301b86d437a98e549a265f68abf82dacd220e7c35b483fa7ef477336046cd8a69969c84019e60915a89fc0960efb73a4b630a198008f0b0138c68d21cb2272e8516f58f9068f2811d8925f5b26022ea2bc71d5e55ddc82d1a723076844239e94e39969306f7d934f9b3a71d5c61ac82ae8fdbf561fe1026384871156d57077834f431d4ecf3ba51f5f90b9687a9f3e0c24f3497f5a227c444e397fba50165f256c72f05ca78aec02b891c448ee2a87351e7e19c5f52dcc5e18f54c1703ee27e7a48fb36af898207b2f53704c4963adb3ffddad358c55d6ff00e35908d660749006f906b192bcb95db2b965941f62c10139ae91b88fcdd9d0b5c1be65e014686dec13e37b158969624919cb166b57a3581c6c830df750bd4490023f8f515ad97deaad77e0601c29664d531a0dd68fb5794786a3e73846a7f20089a93d6be472c738e41b7ceeb7000ebf77bb4be7a06c2c8022f74e8e52a0fac8159a0a24835e08e0a0599cbe721fa0560b94ab43697718872401eccf311e6c313247954836d52fc2ca2401cf5091b19a64b7fea7a48da13fd8817547cbc193d15ece0bfe56945b130919b9abe056e50fd2e2ed0df48973da73fa2da5b56d5f20d9863f08a4d712ba24c9f05fe83d06370c056e9ea55baa957c17b78cb8541e5e049969ef539f6cfea075df7b1b4ecbd3903115ee0b1e54b87eb0993be168a4e13752d97c4fc8c205927f021d780721244366609b9a089923faafd3c857aef8941335e887122eb7e294b891cea9c41208469b4e82a7b941e7f3e574fdc861a9ea7030fd403761fd031e3150cdc152b28967f52da0e137309bd89d0b0135e1338413f6cf4b1f069c4807f72ef71ca63b21287e460252303128c863b4e4fd1a0fe7c94198181c0f118150641ad2d847c70bf1c85590bbdb8c6064632491da52ca78288683201a8dde1198d1880570dc992531b9f50d2df850cce8ee76952db1fd08163a2610ab896d0d44a469ab3805089992ae4d59d0cfbf107a7be9d2624bc18e4963dade1529abeeb2cae6f331d8b4ae186d14092e60c4604820cf02f8609c04524b822c4e308ac7a8da582427e42135a57f40030485e6401f577530ead61f17715a6a4ec281ad28d765a76be8d2dd4b055f7f4b35c62d9590ca45e7a4a9c5f6624e71aef638c03beea57730b62613624f054f5f02389bac95d7c11da791077448cdd641094e24437e54b3946a972b4d502a6226ef782209cb14ef7fb561373e60b7cfa0dbd01bdea0a8c3d10e64676201d61828cd95579725379d6179cb4850b52f333a038313707be152dc92e9114233746e248c470e0108e65fdaa66ba5afbf3bde796c35d9f02584ade9b5cd07099dc27e8f88c311910f30739bc9a4363ae028f7842f00928a347c4b3a6313e62645470b7e6cb769836f2812b2b4c5a9127c236b6a9d8a73cd7902cbb059dd6f6fe63f5877b5c10bfec1d67f0d918705fabce588e5da173f0a0a0fb75d6df00d2c1cdff810aa6d1729408ff160bf0631e2e56e4fd3eba2c4ce0a70466135707c5528773d7dcc4bf03eeb88e059995b074bb528829f27c43d2d2c98f43925c9b54adaa869704aa2721ff2521c0a42622c3e8338b27455a65bb7c25de39843c76a7dd9ae3a775a1db70ec314a68c32b84ed892fe174f89cb9975c875055eb32c54b046e2cf1472331eec0e86e287bec56d253902bf8e2a298f16f837de7c81e18cce2d053d31a99d5ea154da69ab03c4b4d14b36da9b9f994561f62a034ce390b0270236b9b35fbc60f7ee590d258c2e8c0fadc967250c4bc80154f82e838e4eeadacc72319863ee565cbcf098f86257e686aa0d50040023ce4fa22b81b812992198a90a3e59b59a27b986f3e119a92f7e5690f7be0e39555ccaf32782233873b4494ff9787e33af030deed9733ec2d274cfa1aaa38bad5712991943ac083eba90adcbf52c86240d055c84a1c8df0f45e026a545f62cf2f7cb49849abd05dd20ae319e0284e83b823ceb810844884208bdcccc4b5d30b01a58a6b33b445db2461b9ddee25d198824782f4c8993acefbba09d7d1c24d96396779d41c21b4c1fe913bd4f9b29af064d325b2be8b693deb920ec85fda61901c47bfe4a17ab780f6b26b6a7635ea831f6316b99938b7d182ce165563671bc36722ddcd840359f0f9d70c0831bedf46c1b4cd1e8b3d2d4ee34fdaa15abeb9dce3cdf7ce16ad94dc66a608348289dd8c811b4de8016c74b5d48d402c0a08e6e5947255b35d12d452c9055c49e9b752bc5a3d8cbf206d937e8e286316dbb641508a77c7c0fba8acc1c31415b0efa22594cb955d46f98513d9043b54d9253db079d63180f6c3bfe36d01d72fd069e56a09a0a200cd875fb7d0b0e0393a0edd56f8a0051465cc76979f8bf5ee64309c82a7ba059442e9494deb8ba92d0c6608184ddc652a4c741c3b975a4067b45e78d6e7cd5b569ef5ecc5eaf4b2896f602107e556104f5b80e80f95b4836fa9bbf750036b9d33f13f1a3de305e44b9b5beb2e774ca6cf9e09ef13fa96cdc2748264be3f0545f3c62bac7f4657dc3a9c243a9181dfc314508c63053b67b022ab053dc943b2dde33564a15dd117b3babb922c43c720e73aa088462abdc0d70d6387954ed2bba3e13b443f7ba74b99f028e05c182768da42cc321896885d3bd53a39e53c7035e03396da7b3ec2302b7eb685ffe227c1b08f7fff05163d7b1db5e57d1ad90a1c51d9e034e54a7654f7402f4c5ac90f5f6d414335b9933f1c058528d186b091e8d0d4020cf062b4c6d", 0x1000}, {&(0x7f0000001180)="e79476818e397288da9dd29949675dc6f2e6a692e223d7459020d3fe56cbabc13c137f65471f3904ad63aa7e5e7cc6997bea4b01914d86fdfc97c30218150345f9f0251b8e5f877a584e56254bfc229c13d73b0cecfab883734ae1fa4a0a5a446c00ae7a67f1a0fe7e07e6dd783a1245ecf2b06550575c2dbf590e0cd7678828566dde59b62c294a02c225493831e20f", 0x90}, {&(0x7f0000001240)="33a3790c3e93017ad7bd73c70da9368a6058961753eae20657e479221e7bf92e9dc25e8ce096f6789d837dd3fe8f3c2203e2dbe4a347f57956848600140537c63430f9890dc73caeababb39cffe53f06d8c721537030938138bb13129e6af07233cec2c71b0d92811677f2c50ef12d73b09b0a1dfaaa9c225d8dc99dfab340e12fd662a90bd9182d164e96f9b1a2f9840aaaf18f1243c6f1f07053d14a17dcad898654f8afff2a6fb881f21cb46fea754b53d8aa4e66768f8360ff590c0e236bc674d38d1b0f360610b81cc2821d98b4015e90c1fa472dbf8600c64f41d1da7c8430d1e1ffcbdcb731060f3115566b47126a450f6b", 0xf5}, {&(0x7f0000001340)="5643d103489d56a3972cf63f1aeee1f3848df2e7a1c1ff3fc09f9d59aa30d2abe7b4e5bbed588d27dfc095f9d11bde47831a8e3c66c894172acf08675210eaacf39fad2e26da24774fe215312fb82507f4912f4022d842aad4a7db020d707218bb1c82ec1653d36bc017dad69667ea073bd7bea1185fed66ffd7fa85e8a4761754d3ca966362b831d2b4d477c5ad96c025157931fcf8d5bdfc38ce619a5c3cf0def2adeeca5e329b492749f5de67eb2b40657348", 0xb4}, {&(0x7f0000001400)="d2a35e9b875348331b2f10d47f34207808025993f87a5492c2fd12608f40a084a4faffe75b68b8e2cf4f7815e3b569c42a972435d5511a1a2b1551ac878b545040c3a36ad58e62755b15aecca8acffa26cd960f1420c0272bbcd6c4617fc38c37232f6b370976844073f80b08efa78fd0c2cba5821cdf411cdf6f10e2a27ee06088fd0609377d901bcc0be2dd4285878f967812c3526ac1ef6845b27d68494b97d2e7b0b6034f2", 0xa7}, {&(0x7f00000014c0)="26743e57eecd754e4db419950feb49d62ee38f964cde33c3562e2dc0796e42ecb4fadc1d128e8b295e64da1cde1c139ad2a6c925a084bc14ad9877bfba27ed44", 0x40}, {&(0x7f0000001500)="3734bf0aeef6c1db28d60be89c918eadd40a650a626b7bb92572e923e6547711b38669daa06525b695e5ca499322d6e371629329a40d768ea21677f050c6af5b438181b47b5ca9f23481e6f91ee671c785afedced489b44819180b0b9b6923f69e6801dac6189c19d5b8d12ddd07ca81179774eebfb20a3fa98391f51cccc552251fa489e60684cf80ce6f55bf", 0x8d}, {&(0x7f00000015c0)="ac922dff6bbc7b5268fab397cebc4150fb026a8b3861b25f5e549033c2cff0432b93a08a64ac9197e4df61753a555e6f74db3750a924ba264f15e562fc320e1500572e8d15eca75e4968bbd2febbe9d1e82374bdf35850ff489fc1f25d7bf060a4b129b85a31c6b7eb068b10b24800cda44918d39f2adfc830e4c21c7e74ec386679df94b2c9f8cf4c9beec6041f7ea501a77526223c411120107a25fba4f69071a1ed69b29beb0d5b0bfd1f1c5db839452a9466dd78853c3c39d79d05c9f7ac53183e7eec49be434f7171c4ebccd43c26b74a37f61e7e92b005444c700fb2baed463ba53861a0ef6208d3013eb287ffa18fa0774753aa84943c468f077d5c06f3aac49e89cd61ec88639ebeced53ff99c70bdc524a192cd6d8226c9e87a43cda44c422e2fa33640c2d3afa5e28f779d42cd0079eb55ef9e99569b2fe1816c5aa8374d6a475d95528f931c24e3acc1088efe645a486d0d75535b36b1c40ce611bfee2c038e54ecc7d84a5c81b18b4f19b81dab913a8667ed6409fd0f6bda1f85615dc6464eab8b13ba0f520243f3b3442633ee2de166e38edf37e5c4f5e7af14f1e0da397d506a028a8e5366d9f58113a2ff2c16c7177607eb781e98f1c326dedac9e7a91476f044f663261b4a1a562ee113232c75ae25e7195a590e567a7aa8468cc2ada271d7a4049a282aa0e82065405620dc0a5e1835d52d5166231495f86235b84484bee24d9b0c2c9655b7d89f88745e40fa32c0966e6e5cbca5409cc4a8893f924ed8eaace5798ec2320c71e236a6270846cbbc0bf894018dadad108f34b7bbc02cf59598222b4bb7fca7d3927a4cc03470cb2d1620fee9db8026df6e9bbbfdcf17c3bf757006f2046e065ce113297a646440b44a1b697e1e51a1ce7aac58a80f3ecc1e4bccc67f3764c94a936199ad706b09d1da29a0714f355109b49c54c1031989c52df79b0ae380dfb89737669ece92cd50b3a14c80b1e2ca5626c5ccb887478ece610e7688d1e1f290ca27f29c86d3f33e2028b87fa5903752bda8c0a7d5f66e7e718207215e2dd41f7b4fbcb2e4eae382f7b57fbf24cf967891072ebfd377f56b7341d34c6ec4dc4eda22f69b96bc0afa1e8672aa31604d632cb8c6f34a89b9751007e03347897a7cc37cf2c135b0cc6b9ab12ac5fed1e4c65f28714b606ae6bb1f14cc953f3f34acb11fd42f0314d6792ad568ba533559aec73c3feb4a02d2b8b679bfbcb7b0bf1f7bdf59812171a9912df896d0db7fb2d3012d5557a9079b80771ecb0e60aec93e1148add293652d6ab7a168f561b8d124f2caaf03f4ce005b606e46c555fbf75a97b200ae097127ff18882d4cceef66f0788664692c237e9429fefecd313c32e30f43705df30eaf7b336b0b86f3ac0078f228ee38eb315e07f9307bbbc298437b78f097ee893cdafc5da867cb1745dde8115c2af52f3554e50d8608e5991a51a91b91334487eaedfd57eb606c3e31ebba28a409a0af0cac4ef182ad8ef44bb77c453fdcf368f9aea08e6b60ee89c20322c34f3fa063a687717035da5565e6f14a07b5494d56be831b904c6533b954d52d0fe6d818b4c1f624153601ff100a0df9363b9a7fe67cc3682625d67c62f84d84c8051eebcffa5b5677a6865803e7f19409a8545e9d74c4a7790b1f58bc0dbe5872c9046dfe88fac68de3ed20f2098c639f3f8be374c0fc177c5f5722457bdb65f653b0d0c5cd319d6f1f7b32bbd54c4704a100c9cd6dd7c9b0927d1d1ed30aad9067eb809bbf2cfa48f9eb43eabdf694d98bd55fa3f403393099a1caf014a1f718cdb29b08120108f4f8b24a4cf6fe742077faf987fc8508875907b9c86370776fe849bb8c16b94f0bce73314d31c2b6e21a409073a34bcd77aa02521e2b9e742405e6b1ead6772022968dbe1c5ee17f727f02248a47297f26eff4fe24fb5f835235751cc44c2af65d6499d3f796a2af4f06826ed5bebc15ab87e132605d6e3ab2fd2fe5089ff2d36f06581d05dc741101bbc7549b9c66f607a16b8529e7ad50bd7af4b4c9842fe4bb45a15f98f0ba707746f80781d502259bf59e41554bb7539fde2ad5e54779b2903b1c0fd3059b57444fd4d1416f5f5e9505ef56b26da84e7559f9a9d069ee4fe77ca1ddcbe7121cf53d3a7fe6c92ae49cb0ee4cfcbce1e95e888fca2ea45064a7765ef7c6e76e39aa187cbc0c2f111a912145813ab2e776fa84e0261c0691ae07862739f6fa4680bae0453dc93b91ecbb175467de4ea9b4ded1532bc2d2aa44fdf265c5eb61a71765bbf46feec5d3d5c98a62a404f947f3dc9d753159df2d37062fd58e1976a57b14857afd07b24981e1bdd0d705e350cb5459a6327a820dad975815d67e17d9b3798ef198deb73f813fd0f5e1e009fe3861405b2bfa230dd62be1f6d16c1b32b50506c84a734ca0c03121795bb36d1dc9574f5facc978fa175b9cf5ae4b6344ed8f3a5d1151a8af9fd766b87e07208a635d633aa3cb9cc5d6041c5ef23ea302b2f6cab8971e9510675a07d55deb8a4084e5f9aa3907e18fb7c88ad0e055881f8029e96c048b2bbbcdc3ff99a472a14d648c5ae942893dcc81390c54015687faeb18fb4dae94f4cf424184a3460d00a7d6e8a661e1fcf636d9e5a65a3f24d5e28340b430f720c50bdade9fbc56d98c59bfe41756fc82f0cdc7ce7bd4ae9b036d676ad697fd2edfe8b5900de89df189ed15635e410713c001554f55ef1e09c89933e594ea1ad5c54f845799aa33021c8bfeb96040db6f56d86217cc8f1140c18971b86364e57324a333c620e01bcdcc9e84ea7b238d969d43fd24caf571f1561d6dd0d9be346b858da59f3ccf550cba9df6ebbf1f66b0437c1ea63084bd5a7c328b1e24b7d6403193cd7870a187daecf3bf2cea7e821b4d7acbadfb666d4da5fab7cbdd012c0f0a062bad66cb262c0cdcbf5e53bf524b04dd4c09df0f6caa0ef892b3602b2ab1e89b62862863066effd56f4511a41e188243b6bee2626e2d1f1c9d14222547aa27dad28ad3f256fb06be410bcf7f5f9b702ab3513c97823e47c503d860d3632c940a5ee914fd0f61837a68ec4bfdb303bf8eef3bb847de98380aa8f5a99b0a42a4acbc6ca4bccd6db27d780439c0acec7f0a4d76bd5f9595a934f0b9adcf2ea0422ca1ec7970940a87b4650f2d95bec4a05ba9639caef9917347b20a65782a3fe01e24baf5a2fa54422171c7760b38b6783225fdb4124e6ce66d1784dc57fe1df0c5bbef9b1264c759b593cb7a50b2fa4d08beaf6f420da30da1f9c6f535f1cebb0eacec26561ada6b6f52072a8acaa4092162c7a215178a70fa6cf9bc6510fbfaa4b5b3c15d178d347256f6ee04f7c777bfa07ee41ba1a971b1cc39fea8c2b428ea9ebe933f4df96ea30296be5b2d293adfa25d5bb448df1b87e72b78d30a8a573dedb2ebe109248cab525ec1a25da0f915436a3d1554965b6f92633afa91a8d202cf74defe54df400ff24f568a9700797e9263c7e4e1a24f35bd2d3430e071f85ae8ed33133822ee69180810aa521e6e0afa1dc1280c9778ef1f3ba62ac39eac56ecb64b3aa0837f88aa104b6c8beb41366e7aa913abc3ee750706b190e1fe06fc8abfa7e8146bf8e42777c5b8c655f552dc887ead522651cb6df6305fc3d69d81cfdf908a0fd941928c74e982cc8e11b83276e1974770f8d83f2bc55ff54f32aec19f97f822d12767e52b1822155477194ae5377fb893bfc0917badc544295b453711206cf68d9c30deb7b880c4102ff4979924018df2f4266fdf98eb6b372f658c092882e055bbdae63beaca1e0f68a446cdc1578b181d1e5fb28aec54453c5b9c6cce4384536ccbb5a408591213ec89c1b1d64d2c73fcdd2314749e35bfdb4b0966551de0e76191418dac94cc509babac2584b5527fe7f24279db73d7e629ccf40f1ad1898f11e0db6b385a2d832c9c92a4fe2ad2d88d287e53ab56ae2f97fea3133676805e40667940c65d7d60085372471e3d7dbe9fe99dd547f3580981973f56f812b7d9dbb6da9b8bef24643146e46b8d891c8221f49df1ec13c2adad36722819dcec8a92699fb637fe156d8257ab75b1e564083f3fecc182173f061a3309e6f89c461148538c0bcb60bf913219f4a6532d10032f95f6d3ecaa4f7f1edbe1bef03fdcf862462d9a6a62907459922d2f1f3f0c514f28d3a2a0fbc519b31e57072bd8e4c08a73144db681b4cc05dcda81886fedf5043805b34dca0d3afd8a4755f023469a17fe74e270a1c8709e7ea9641a9efcfb6e49bcba61b71e248e895e97068edade2b3a50041b3913d0fb6c3731246f67e5fea4441665ca030085fb1071a3520a12e78077d5de435727ae2a616af71819d094fe93ad71a6ce76bbf141a65b565f6c28b8f1ae809912c7137cb4017e05aa2fc9fbf281c54f8dd0ba1efd30a62e0d9c0bcb04e85d77ff03e31bb11c3bc5a0daff9a6f514618fd1b6a0d16525ec6515dec66b6b17a496c3558f6bb87934ac297dcb649bd6a8e365d1301f9843163075195bb0adf55b83961385152c35638afd4d1a171f3f95fb2c2221a31c427411133b93554ecc4b6503c33fe048e86e36ca4801beec213fbab0f113dedfaed7efd8926e2efbe3411da3d2f95246c567e153ac086de0ccddbd9f8d52a87d1e6fbf3b8d65484a78480c686c8d4561fef92a7f7fd8becdaf1707e502c97d90575a9c2d3b0b3484c6f77ddef8946ade6becfc606f00b94eb7414033273b790b787d7ff7a62d68b3f423df76a226816c65badd6475e6a31cd21577f3b93088ccfd20894bc10a4662bdbf3d2b96d4cc3fb5b78069bc4891fb03f0ca79702862fe893bc23e14078da36aec479066fdd54358fdc85f0468a3cfda5d252eecd984db49a4b249e4eb751d5ac8ef268a3f86d870e4ee5284533acf6f31766e798ab796ba042c2423e7157a9f20ecd3419cd90e3aa8c495073a5f7d70404bc6a703ce5fc2bcdf4b5f70d26b923d28dde2905e44128fd822d1f1cb6dc698491f918105314ab32767780ee21486e5d4f328a035aa711f24d43e1aaf625a3499979a41fdc81f8d352316a11d9a35ca53c842c07186175629ec70cb66795177db2db7ad19b9e09056add0564ed058d3c84a1b01c1caa5684d36dc31f90ecf7606185f480001c55368c0281af6e4d0635287ba8cb3ab13e3aed936055bacbf5dff458b57dbd664e658bee1b3b5efef4963456c164f02600ad8db7dfd4264cdd7d3b35f7b183b08bef48ada83738bc97b79a666b819acbb9457bed99403817253a5fad87a12813b51beaf1f44a1c0a6ef31b490349c7b530401cc1dcaec29ec2ef2a38423020eea9fbe935b729577120713a15612bc47946ee65d16b41ca9148592fa0df228a15a4304f18e829fc0b95a2e6c94a6ad4a94c5b074719f2e21aa82020724dbbc781e8232606793597bbdcf386cc77a9ae63646578d34d59d4ec9e08b54dc11a0106e073ecc5a9fb749ba6f2bae1709e3df21c1f402b64e370bbe166345acc38ee03a6493da9c248c6146cbde72a5a4aa0efaefc2d898d6d8a5fbd8585541282d1af5a000d9e46a9a12a42d3ce7d9f63637c35146c7bfab026d213f7c8a70d511b78feff27ef8e6b146889d4e75d9d0d77df5d6236a717da055a1316f32d6ef7506cd44e018c92ff6c140bf7f4ccfa4a9d838cbcb7ae7a14fb5b16168a1dd032325b7253215d39b7e470633bf599159665b0ca2fec30c0f327fc44725f07aeaee05ec46b8cb389bd1776203ac2d3984da998648a59944b9520f023fb8a7e75c3d574ec0f9d46b9719cd4", 0x1000}, {&(0x7f00000025c0)="3a40dd9e720e317499ac710c9bc0985ef6095da5d930591a6fe07412f7be2ce6de53a55b2a0462a00ce15fd8dd2038ebd2f2c4b2e8259297c119852cdf193199be5d26df00f6f48d1e54b96e695e06368c4936cc99", 0x55}], 0x9, &(0x7f0000002700)=[{0xc8, 0x117, 0x2, "5b2be34612f9c81a55ad3eb8a7f5af484e3a016d82a0f171dfe8b5b40f989979c42afc71fdd16deb0f1e580bc8eb5adbde9d29cc15ea64b75786270b8f3b919bf9a8a88fa7c2e162e14dca62f3ff50a949b7b0ebe917abd2e9d913eff14a6c4b81c1583208ff0b00315f03c2ed9e70ec4a9947f19f13dd9468f8afbeb4ded9ca89487a99a4405826f4c2d43cb17fe84974c1605fb44e7b4edf67a08fe33f448dc83c7906b408d079f47b0f5ec353ae976a60"}, {0xe8, 0x197, 0xc000, "ecc8952b86b0ab055b51eecdc601debb005a537a8935de6b6d800601353dc66eff442ddab0b3fb9fd40039a3e67a25a8c7231cfa0653eb754a5de5d3ae35f79931fe3bd57bf16f53b0efba48cacd5d31c4b9ffbe7116c949e5aa61d720e68c2d1d8cc2cb555550a3971a43f266b1b32da2bb3a7b3034d533c5c8af15b4267e8dd8c94273f225e1e6e5911590a41dca580290b460280b83770d35c27cef0cad34e6ff5592a58310ac26e7baf27a9c9d39573230ef996c46c88d96d5fb0ef9c278a554d6baf46f6d53c3d5a70c47c2dab54ee7a5cceb25"}], 0x1b0}, 0xc4) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000002a40)={0x0, 0x2}, &(0x7f0000002a80)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000002ac0)=@assoc_id=r2, 0x4) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000080)={0x0, {0x39, 0x1}}) clock_gettime(0x0, &(0x7f0000002b00)={0x0, 0x0}) write$evdev(r0, &(0x7f0000002b40)=[{{r3, r4/1000+30000}, 0x1f, 0x1, 0x3f}], 0x18) [ 821.779503][T17526] EXT4-fs (sda1): Ignoring removed bh option 04:51:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 04:51:14 executing program 4: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x400000, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000000)={0x1}) 04:51:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x7000000}) 04:51:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c, 0x0}], 0x1, 0x0) [ 822.020470][T17655] QAT: Invalid ioctl 04:51:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x8000000}) 04:51:14 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x2f, 'cpu'}, {0x2f, 'rdma'}]}, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000380)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(r1, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x3, 0x40, 0x5, 0x0, 0x0, 0xffffffffffffeaa3, 0x0, 0xa98, 0x0, 0x0, 0x4, 0x101, 0x0, 0x0, 0x1c, 0xfffffffffffffffc, 0x7, 0x401, 0x0, 0x0, 0x5, 0x938, 0x10000, 0xfff, 0x81, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x7, 0x200}, 0x4280, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/111, 0x6f}], 0x3, &(0x7f00000016c0)=""/112, 0x70}, 0xb538ae97c7e8d634) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x40000000}) 04:51:14 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x80000000000001f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)={0x1}) 04:51:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 822.359557][ T26] audit: type=1804 audit(2000004674.782:2626): pid=17838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir913891908/syzkaller.UeZ8l1/1916/memory.events" dev="sda1" ino=16770 res=1 04:51:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}]}) 04:51:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0xfdfdffff}) 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:15 executing program 4: sysfs$2(0x2, 0xa8fde6b, &(0x7f0000000100)=""/227) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x203) syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x4, 0x0, 0x2, 0x7fff}) r2 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x200) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f00000004c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000500)={{{@in=@dev={0xac, 0x14, 0x14, 0xd}, @in6=@ipv4={[], [], @multicast1}, 0x4e24, 0x40, 0x4e23, 0x1000, 0xa, 0x80, 0x80, 0xff, r3, r4}, {0x0, 0x4000000000, 0x8, 0x2, 0x1000, 0x686, 0xfffffffffffffffc, 0x20}, {0x2, 0x9, 0xffffffffffffffc0, 0x2}, 0xfffffffffffff800, 0x0, 0x1, 0x1, 0x1, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x29}, 0x4d3, 0xff}, 0xa, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x3, 0x3, 0x9, 0x6, 0xe6f}}, 0xe8) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000200)={0x5, r1, 0x10000, 0x80000001}) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7191, 0x8000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r5, 0xc018620c, &(0x7f0000000080)={0x2}) 04:51:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 822.609051][ T26] audit: type=1800 audit(2000004675.020:2627): pid=17838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="memory.events" dev="sda1" ino=16770 res=0 04:51:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x100) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.syz\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x200043) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x3e) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000140)=@gcm_256={{}, "b1e7e66ad13bca71", "d4eb891a408fa6d85839fc58d102abb2f3617c0af8900c60d0486df91171f113", "f88d5c73", "2afd83976cc1f77c"}, 0x38) r2 = fsopen(&(0x7f00000000c0)='aufs\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000002c0)='\x00', &(0x7f0000000200)='@selinuxwlan0eth1\x00', 0x0) 04:51:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0xff000000}) 04:51:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0xfffffdfd}) 04:51:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:15 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x2703, 0x0) write$apparmor_current(r1, &(0x7f0000000140)=@hat={'permhat ', 0x1, 0x5e, ['#*ppp1\x00', '/dev/dri/card#\x00', '/dev/dri/card#\x00', '&!\x00', 'keyring\x05proc\xd0]eth1(+^\x00', '{\x00', 'em1\\cgroup\x00']}, 0x66) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000000080)=[0x4, 0x1], 0x2) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000040)) 04:51:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)) 04:51:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x100000000000000}) 04:51:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) 04:51:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:15 executing program 4: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x2}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=""/17, 0x11, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r2, 0x4) 04:51:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x200000000000000}) 04:51:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)) 04:51:15 executing program 1: socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_dev$mice(&(0x7f0000001340)='/dev/input/mice\x00', 0x0, 0x1) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000001380)={0x7, 0x0, 0x0, 0xc21d, 0x9, 0x4, 0x8, "f65b2e2834435e99734793ecf8149bb33070e522", "61d551269b13c2ae65ce91c7582e9dbe6d2dda3f"}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000001200)={0x2, 0x4, 0x4, 0x0, 0x0, [], [], [], 0x418, 0x5}) r4 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x6000) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4e, 0x4e, 0xb, [@var={0xe, 0x0, 0x0, 0xe, 0x2, 0x1}, @restrict={0x10, 0x0, 0x0, 0xb, 0x5}, @datasec={0x7, 0x3, 0x0, 0xf, 0x2, [{0x3, 0x9, 0x9}, {0x5, 0xfffffffffffffffb, 0x3}, {0x4, 0x8, 0x8}], 'M\\'}]}, {0x0, [0x7f, 0x61, 0x7f, 0x0, 0x5f, 0x0, 0x61, 0x0, 0x3e]}}, &(0x7f0000000180)=""/4096, 0x73, 0x1000}, 0x20) kcmp(r0, r1, 0x6, r4, r5) mkdir(&(0x7f0000000040)='./file0\x00', 0x8) 04:51:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x300000000000000}) 04:51:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:16 executing program 4: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x80000000, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x4, 0x8000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x101000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={@rand_addr="f7dd026507393ec2c1a587274f165b44", 0x3a, r2}) 04:51:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x400000000000000}) 04:51:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000003e80)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003ec0)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000003fc0)=0xe8) bind$bt_hci(r0, &(0x7f0000004000)={0x1f, r1, 0x3}, 0xc) 04:51:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x500000000000000}) 04:51:16 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 04:51:16 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1e, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0xfffffffffffffffe}) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x600000000000000}) 04:51:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:16 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffd) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000002c0), &(0x7f0000000340)=0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000001c0)=0xfffffdd5) ioctl$TCFLSH(r0, 0x540b, 0xa9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)=0x0) ptrace$pokeuser(0x6, r2, 0x82d, 0x1000) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030313030302c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d3030303030303030307dde21304a9b4b36f50b30303030303030303036363137332c66736d616769633d3078303030303030303030303030303030382c7065726d69745f646972", @ANYRESDEC=r1, @ANYBLOB="4a726f6f74636f6e746578743d757365725f752c7375626a5f747970653d7d2c00e205eef35392383d5bce8e274e1232690853920683d1"]) 04:51:16 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x201, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000040)={0x1, {}, 0x20, 0x1000}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:16 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x1f, 0x683fd) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = fcntl$dupfd(r0, 0x406, r0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f00000000c0)='silent\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x109041) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000180)) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f00000001c0)={&(0x7f0000ffd000/0x3000)=nil, 0x155c, 0x4, 0x6, &(0x7f0000ffd000/0x3000)=nil, 0x3}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000100)=0x7fff) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000080)=0x8240000000000000) [ 824.372068][T18854] bpf: Bad value for 'mode' 04:51:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x700000000000000}) 04:51:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in6=@mcast1, 0x4e24, 0x8, 0x4e22, 0x6, 0xa, 0x80, 0x20, 0x2c, r2, r1}, {0x86, 0x3, 0x1, 0xffffffffffffffff, 0xfffffffffffff912, 0x7f, 0xd1, 0x9}, {0x7, 0x400, 0x2, 0x200}, 0x80, 0x6e6bbf, 0x1, 0x1, 0x2}, {{@in=@loopback, 0x4d4, 0xff}, 0x2, @in6=@rand_addr="17a49a9e147700c29b4c61dfee07585e", 0x3500, 0x3, 0x7b8272d12dd57f4b, 0x5, 0x3, 0x5, 0x4}}, 0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78, 0x0, 0x2, {0x76d8, 0x8, 0x0, {0x1, 0x8e80, 0xffffffffffffffff, 0x399e00000000, 0xfffffffffffffffe, 0xba5, 0x5, 0x20, 0x6, 0x1, 0x0, r1, r3, 0x6, 0x540c}}}, 0x78) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000100)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x28000, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f00000001c0)={0x3, 0x1, [0x80, 0xfffffffffffffffe, 0x9, 0x8, 0x8, 0x100000000, 0x1000, 0x3]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000080)={{0x100000000, 0x80000000, 0x1, 0x59e, 0x8001, 0x10001}, 0xffffffffffffffe1}) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f00000003c0)={0xffff, 0x1}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000140)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x2, {0x2, 0x4e20, @remote}, 'veth0\x00'}) ioctl$RTC_AIE_OFF(r0, 0x7002) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:17 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={'rose0\x00', {0x2, 0x4e20, @local}}) 04:51:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x800000000000000}) 04:51:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_virtio(&(0x7f0000000040)='-,eth0wlan0*\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0x10000, &(0x7f0000000100)={'trans=virtio,', {[], [{@smackfshat={'smackfshat', 0x3d, 'system.cpuset'}}, {@permit_directio='permit_directio'}, {@appraise='appraise'}]}}) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x400002) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file2', [{}], 0xa, "5c5874252d549de03a885e46c2f577ccb7e60d57f715d1"}, 0x23) symlinkat(&(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 824.943610][T19409] EXT4-fs: 20 callbacks suppressed [ 824.943621][T19409] EXT4-fs (sda1): Ignoring removed bh option [ 824.974905][T19409] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 824.974905][T19409] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 824.974905][T19409] 04:51:17 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000080)={r2, 0x7ff, 0x1, 0x8, 0xc0d, 0x0, 0x4}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000380), &(0x7f00000003c0)=0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x3}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x5, 0x8000, 0x8d, 0x3c, r3}, 0x10) [ 825.026625][T19409] EXT4-fs (sda1): re-mounted. Opts: noquota,bh,nouser_xattr,acl,data_err=ignore,jqfmt=vfsold, 04:51:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x1c3082, 0x43) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000080)) 04:51:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) 04:51:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:17 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x12, 0x7, 0x5, 0xeca, 0x4, [{0xd7, 0xffffffff, 0x40, 0x0, 0x0, 0x800}, {0x1, 0x6, 0x20, 0x0, 0x0, 0x804}, {0x0, 0x3, 0xd4}, {0x2, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x800}]}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80100, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="98ead7e22008e8aad30f49bab58a1928e660a559e81df012d77559b28660fedde4107683060a1be4a8959fa023e967c487f0ecb6a4a3c141c5ec61c91bb383ddd4d1ab02a7dc31e6ddfb8dd3fde931621e7cce5c420955772928706027d33a01ea207dcaedd8a2330885e826e2c5b4bc5b139c7652", &(0x7f0000000100)=""/167}, 0x18) 04:51:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:17 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0xff00000000000000}) 04:51:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x2}) 04:51:18 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x81, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, &(0x7f00000000c0)=0x80) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x800000000f9, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000001c0)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bind$rose(r1, &(0x7f0000000100)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x5, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000280)={0xfffffffffffffff7, 0x4, 0x6, 0x1, 0xd, 0x101, 0xe9c3, 0x1ff, 0xfffffffffffffffa, 0x1}) 04:51:18 executing program 4: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r0 = open(&(0x7f0000000040)='./file0\x00', 0x200800, 0x4) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x3}) 04:51:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "856734c26e"}, 0x6, 0x1) 04:51:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x4}) 04:51:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:18 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x20080) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:18 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x5}) 04:51:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x201, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000b40)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)=0x0) r9 = getgid() r10 = getegid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x3, r2}], {0x4, 0x4}, [{0x8, 0x7, r3}, {0x8, 0x2, r4}, {0x8, 0x6, r5}, {0x8, 0x6, r6}, {0x8, 0x1, r7}, {0x8, 0x4, r8}, {0x8, 0x6, r9}, {0x8, 0x1, r10}], {0x10, 0x7}}, 0x74, 0x1) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x10, 0x100) 04:51:18 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) 04:51:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:18 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:18 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x6}) 04:51:18 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e20, 0x1, @rand_addr="c712072437ff290779092e4aa2cd76ba", 0x9d0a}, {0xa, 0x4e21, 0x3, @remote, 0xfffffffffffffff7}, 0x7, [0x10001, 0x2, 0x61, 0x3, 0x7, 0x1, 0x3, 0xff]}, 0x5c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:18 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r4 = getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) r7 = getgid() setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000011c0)={0x3}, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000001240)=0xffffffffffffff68) getresgid(&(0x7f00000008c0), &(0x7f0000000900)=0x0, &(0x7f0000000940)) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)=0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000b00)=0x0, &(0x7f0000000b40), &(0x7f0000000b80)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000c80)=ANY=[@ANYBLOB="28050000daffffff0800000000000000040000000000000000000000000000000000000000000000ffff0000000000000900000032000000000000000000000006000000000000000400000000000000070000000000000009000000000000000900000000000000030c00004d050000000000000900000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="2000000001000000000000000400000000000000010000000000000011000000010100007d2a2c766d6e6574306c6f6d643573756d000000000000000500000000000000000000000000000009000000000000000700000000000000030000006be900000000000000000000030000000000000005000000000000000600000000000000060000000000000007000000000000000900000004000000040000000100000009000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0400000001f8ffff00000000040000000000000008000000000000000000000006000000000000000000000001000000000000000080000000000000ff0300000000000043200000ae04000004000000000000000000000000000000020000000000000002000000000000005d04000000000000000200000000000001010000000000000200000003000000ffffffff", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="030000000100000000000000010000000000000002000000000000000000000004000000050000000000000001000000000000000000000000000000060000000000000004000000200000000100000000000000040000000000000003000000000000000000000000000000ff07000000000000fa00000000000000ff0f000000000080020000000000000001000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0600000000000000000000000300000000000000fe09000000000000090000000008000024736563757269747900000000000000010000000000000003000000000000000000000000000000000000000100000006000000f8ffffff010000000000000001000000000000000900000000000000040000000000000004000000000000000100008000000000090000000900000098370000ff03000000000080", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="090000007f00000000000000060000000000000000040000000000000f000000f9ffffff2f6465762f6472692f63617264230000020000000000000002000000000000000000000000000000ffffff7f00000000a5a30000070000000600000000000000ea00000000000000ffffffff000000007f00000000000000070000000000000003000000000000000800000001000000090000000700000000000000", @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="cc0000000900000000000000a50000000000000081000000000000000f000000000001002f6465762f6472692f63617264230000040000000000000003000000000000000400000000000000000100000000000009000000090000000000000000000000a8b100000000000009000000000000004000000000000000000000000000000003000000000000000700000008000000be0b000009000000ff070000", @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="02000000c0cc0000000000000000000000000000962b9b0d000000000f000000200000002f6465762f6472692f6361726423000002000000000000000300000000000000c800000000000000020000000000000002000000030000000600000000000000ff7f000000000000ff000000000000006103000000000000030000000000000002000000000000000300000003000000000100001211000001000000", @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="fbffffff3f00000000000000030000000000000003000000000000000000000007000000"], 0x528) 04:51:18 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x7}) 04:51:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:19 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e23, 0x6, @empty, 0x1}, {0xa, 0x4e21, 0x8, @mcast1, 0x400}, 0x40, [0xfffffffffffffffd, 0xffffffffffffffe1, 0x5, 0x2, 0x3000, 0x201, 0xfffffffffffffffb, 0x200]}, 0x5c) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2000) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14, 0x13, 0x1, {0x80, 0x0, 0x6}}, 0x14) 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:19 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:19 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x40000) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)) 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x301]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x8}) 04:51:19 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) ptrace$setopts(0x4200, r0, 0x1, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x300}) 04:51:19 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)={0x8002}) 04:51:19 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:19 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:19 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x500}) 04:51:19 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x104, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)={0x1}) 04:51:19 executing program 1: arch_prctl$ARCH_GET_CPUID(0x1011) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x6}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r1, 0x80000, r2}) 04:51:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:20 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:20 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7fff, 0x400) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x600}) 04:51:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x4) r0 = getpgrp(0x0) waitid(0x2, r0, &(0x7f0000000040), 0x40000009, 0x0) 04:51:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x700}) 04:51:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:20 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x7, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)={0xfffffffffffffffe}) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x7f, 0x4, 0x1d7d, 0x9, 0x9f3f, 0x9, 0x4, 0x4, 0x0, 0x5, 0x4}, 0xb) 04:51:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x4000}) 04:51:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) 04:51:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0xff00}) 04:51:20 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x1, 0x30, 0x1, 0x8}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x3}, &(0x7f0000000180)=0x8) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x98000) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000001c0)={'\x00', {0x2, 0x4e24, @loopback}}) 04:51:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:20 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x43) 04:51:20 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000040)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 04:51:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x2000000}) 04:51:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:21 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x590ee36b2d9103cc, 0x108) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) fcntl$setpipe(r1, 0x407, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x17, 0x3, 0x3ff, 0x8, 0xd0, r1, 0x100000000, [], r2, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x66) 04:51:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x3000000}) 04:51:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:21 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:21 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x4000000}) 04:51:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:21 executing program 4: socketpair(0x10, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x41020000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x0, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x100}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:21 executing program 1: setxattr$security_smack_entry(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='%-self^\x00', 0x8, 0x1) mkdir(&(0x7f0000000080)='./file1\x00', 0x20000000) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x4, 0x80) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000140)=0xdc85) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) 04:51:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x5000000}) 04:51:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:21 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00fb0702091029f03c0a8f46509604ea71eb3962d23f0f92468f03bf85ad18518abad38db6e1f078e51cbb23a21fe342c7690b1660e3376e0db8baeeb995fe44a779d0a09344439fa5de2f1d25189ea92e5c890caf57b009a46702559e3d8470fa7579ee26f1050395727c68a011494a04702d113ad5a96a6983aba4219d62c088f1c436215d2a39bcef13cf5b42371a9503758449bed2fafb3ada27f2d8170b34f41f3f12d5a1f4cadf6c79201c802080a450278a2f00eaecd4f915200d51524e22417056589c37b0e7c7e6052d3392ed377e3d0f934a6aa18c48f9fca1a0db1a2aa12589026b09cbd3eb4cf4181562bce4a8af7877d75878be3b724b1c692d44154f61314500"], 0x107, 0x2) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x400) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x6000000}) 04:51:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:22 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:22 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x3}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8000, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0xfffffffffffffff5, 0x6, {{0x8, 0x1ff, 0x9, 0x7fffffff, 0x3, 0x4, 0x1, 0x3ff}}}, 0x60) 04:51:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x7000000}) 04:51:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:22 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180)={0x1}, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) lsetxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x3) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x578afea8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffff8, 0x3}, 0x8) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:22 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000040)={0xa0, &(0x7f0000000100)=""/160}) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x8000000}) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:51:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:22 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000080)={0x1}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='sched\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000140)={0x40, 0x1, 'client1\x00', 0xffffffff80000000, "61ede64e40db0fc2", "87602184e834530b33159f98dbb8a275c539fa5df5fbaffaa82c3407ee9e6e1a", 0x8, 0x3}) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000040)=0x96) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000200)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000280)={r3, r4}) 04:51:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 04:51:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:22 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800002}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r1, @ANYBLOB="00012dbd7000fedbdf250300000008000600000000003c0003000800040007000000140002007665746830000000000000000000000008000500ac1414aa14000600ff010000000000000000000000000001080005000400000008000400000000000800060000000000080004000000000008000400d80f00004c00030008000400ff030000140002006c6170623000b8ecfe5d23cd0601fee9e268ef7700000000000000000000140006000000000000000000000000000000000008000004000000080000020215b295696ea4071aa282467be7a0a1e2e2a0eae38939cf24679a07e04519196b6d830aab6c9749012eeaab59f795881bbdc92f2faac475693a70"], 0xcc}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x10000, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='security.apparmor\x00', &(0x7f0000000180)=')){\x00', 0x4, 0x2) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x4010013, r0, 0x10000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000002c0)={0x7, 0x0, 0x3, 0xffffffffffff2506, 0x80}, 0x14) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:23 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4000000000, 0x101000) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000100)={0x1, "0a4b5ba4d351b4d8f251a57dd09bd8c5db54824ed880cb38da94d2b04084e4d8", 0x7, 0x200, 0x3, 0x5, 0x4, 0x2, 0x81, 0x80}) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000080)={0x0, 0x0, 0x3ff, &(0x7f0000000040)=0xffff}) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x7f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0xff000000}) 04:51:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xad50aaa472c299f5, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x318400, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@nodevmap='nodevmap'}, {@cache_loose='cache=loose'}, {@cache_loose='cache=loose'}, {@fscache='fscache'}, {@cache_fscache='cache=fscache'}, {@cache_loose='cache=loose'}, {@access_uid={'access', 0x3d, r2}}, {@cache_loose='cache=loose'}, {@noextend='noextend'}], [{@context={'context', 0x3d, 'staff_u'}}]}}) 04:51:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) 04:51:23 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0x101000) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f00000000c0)={0x1ffffe}) 04:51:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:51:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}) 04:51:23 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x3, 0x7, 0xa, 0x16f}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000140)=0x200000, 0x4) 04:51:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:51:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x100000001, 0x10000) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x7f3, 0x7b, &(0x7f0000000080)="c4cdd33f23789d91e7f57ef3a1ac7a459367da7150d342de71bcb808e70afe8913ea521cb34cb4cb3b79d5684fca78a474f735e32725d3d38c7d3d904c26a865a3d8b56d1cddf0ada55c34cd250dda2bcf06ec8317109afa7f39f0fb125844b8979043c452fbe8ba907896317ecda8e0d68fbe8639e3f33d869a13", 0x7fffffff, 0x0, 0x81, 0x10000, 0x7, 0x2, 0x7ff, 'syz0\x00'}) fstat(r1, &(0x7f00000001c0)) 04:51:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 04:51:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 831.547588][T23765] EXT4-fs (sda1): re-mounted. Opts: 04:51:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}) 04:51:24 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)={0x1}) 04:51:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:51:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x40000000000083, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000100)=0x1) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/97, 0x61) sendmmsg$sock(r0, &(0x7f0000000880)=[{{&(0x7f0000000180)=@nfc_llcp={0x27, 0x1, 0x0, 0x3, 0xff, 0x1, "17447ccd1107907f94a8c64b797b5321bfa0f022fdf0fc15675ffabc047566f736e6a5572411c91da96e2317c0aa4dcde1dfa2320c51f60e713ca380103c6a", 0x21}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)="b208fac36bb240c3bbcc54f48aba3433bf475d619b90eee5b36e5828ae07802881c75cbf34ec7c1ebaffac84449f3cd87f5fd8be69a2dec217ae515711d4c40e9d268d16fe3d8e54423d21312b818a35c0f4de1317a2bd4173bf9662a6f615949a8916085daed6742ebc09ea1741d17c8fa2471fea66f47caec54a68fadc83e078", 0x81}], 0x1, &(0x7f0000000300)=[@txtime={{0x18, 0x1, 0x3d, 0x8018}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x180000000000000}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffffffffffffc}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x90}}, {{&(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x6, 0x7, 0x7, "dbd0a30c4557326efa46c36c1a36b664cb6e663aa1d92dc02d6fde40e52f6a0f63e5d1f523ef533a7fb51dab5746a60487d936960f770d8e7afaa0bf997b21"}, 0x80, &(0x7f0000000440)}}, {{&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x1, 0x1, 0x4}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000500)="0346291dcd92d07dd4369ff2ee383c1f77152d4f2739847ca1e7af99569fdd94bb23b95753847861f5d244ee26b9824e7e2ac6bb6c200b32f70126a247749571", 0x40}, {&(0x7f0000000540)="456024c0aefb29da9884419fe0971b1ef0cf0b48c76dfc8e2e3c49a6932e413042de329329287a9863905d14a0e295600caf2d4bdad13f6f6f717242ca13e129bc6df06403", 0x45}, {&(0x7f00000005c0)="2fae370db21c44dd5e4a7843f9b793", 0xf}, {&(0x7f0000000600)="d3f64f832f805efd", 0x8}, {&(0x7f0000000640)="a384779ca49dda0a45cb4ce1a26063a5796e0890ead97bdc5fbcadf170", 0x1d}, {&(0x7f0000000680)="46563358dbb66b923f1d8caa83b258538725a5eadb0178b7d9c7709ad79870486dcd01d22f2d8d897c489e4f7ece0614e07c93d1e6a5a237450d7bd4edcb49b3077ca1dcf950c66b3019c4292640d64cfe873e99b559ea7ce232e28144b2f4b8b0612e0cfaf12fcb7a6e91117f018bf88a7699a0ad5ba6ff6c39297240b1c0470a7761ff61b117743324c0979c72f985bc985067af837e2e35d9583f22fa8dd2fc", 0xa1}], 0x6, &(0x7f00000007c0)=[@txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffaf}}, @timestamping={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x90}}], 0x3, 0xab73f64639bd53ea) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f00000000c0)={0x101, 0x9, 0x100000001, 0x1, 0x4}) 04:51:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}) 04:51:24 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000040)=""/27, 0x1b}, {&(0x7f0000000100)=""/228, 0xe4}, {&(0x7f0000000200)=""/246, 0xf6}, {&(0x7f0000000340)=""/220, 0xdc}, {&(0x7f0000000440)=""/73, 0x49}, {&(0x7f00000004c0)=""/86, 0x56}, {&(0x7f0000000080)=""/25, 0x19}], 0x7) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200100, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80800) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) [ 831.876457][T23990] EXT4-fs (sda1): re-mounted. Opts: 04:51:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, 0x0) 04:51:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}) 04:51:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r4 = dup2(r3, r3) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x7b, &(0x7f0000000140)={0x8}, 0x8) r5 = dup2(r1, r4) dup3(r5, r2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 832.073009][T24108] EXT4-fs (sda1): re-mounted. Opts: 04:51:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@data_err_ignore='data_err=ignore'}]}) 04:51:24 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x201) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6gretap0\x00', 0x0}) connect$packet(r0, &(0x7f0000000100)={0x11, 0x1f, r1, 0x1, 0x1, 0x6, @dev={[], 0x19}}, 0x14) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) dup3(r2, r2, 0x0) r3 = dup(r2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000000)={0x2}) 04:51:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}) 04:51:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc805]}}, 0x1c, 0x0}], 0x1, 0x0) [ 832.272215][T24241] EXT4-fs (sda1): Ignoring removed bh option [ 832.283486][T24241] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 832.283486][T24241] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 832.283486][T24241] 04:51:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:24 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x100, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x4, 0xfff, 0x400, 0x76, 0x5, 0x9}) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000000c0)={0x9, 0x30314142, 0x1, @stepwise={0x9, 0x7, 0x10, 0x8, 0xfff, 0x101}}) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="02e51f36a670e7ecf0ad92c1ca801a7edc26c0c6fe7e1bf5a34d87d213a4da97faea73e5749bb2f17503c1114934d4ffae827d9967d634477233f11aba5d418e2a6cefcdbc5c8a3e9feba3f54362297f78a6772eb9abc7470c1fe9a7878ef9544b1de61e7b02b12b67ee3b8914dbccbe8b02f9651e7c04292b24cee6488b070798e616c811bec6d53912223e468f6946e2b826e2096dee71ede5dd91a91727f9ab3918c0730c0ec3ea495dd3daeb3934f49012c902b2f6762f648d3df66e0e7ef6dad9f7147f609ee631e58cdf9f6c6096cb583a8f027785ab4f25cb6aa452fb3856c0aa5cfb", 0xe6, 0xfffffffffffffffd) setxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v1={0x1000000, [{0x5, 0x2}]}, 0xc, 0x3) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-monitor\x00', 0x10000, 0x0) keyctl$read(0xb, r1, &(0x7f00000002c0)=""/67, 0x43) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fremovexattr(r0, &(0x7f0000000340)=@known='system.posix_acl_access\x00') 04:51:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}) [ 832.344605][T24241] EXT4-fs (sda1): re-mounted. Opts: noquota,bh,nouser_xattr,acl,data_err=ignore, 04:51:24 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9, 0x4) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}]}) 04:51:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}) 04:51:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:25 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1f, 0x20000000000) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8001, 0x40000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x5}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0xb1, "fb0fde0d9ca28aad737e796a8fe3a3832bde581490faf4a0d48d2c69c2104abe625aff2a4845f4565f939a02ae4b684d4a561b441571d2903bb531120f682c7ead57c824445ae3a02f48c1c7f60e5f43e3cc52aacb097a8bd07faa9e894013baec9ffdbabd682e1a7ed2a8cc6f7fb984d2324d16da40f6a947d48c0e8f0bb609dcb4acac4532f40a49d32fb381a4dc11fcd98a60d25923e7ee7410f2c117ea45be6746e0f3d187fd4a1dc9c426fc37a7ae"}, &(0x7f00000001c0)=0xb9) sendto$unix(r1, &(0x7f0000000200)="469aedf062a64106f4c54c437ddd2decc44778aec691d493dfa51ca338b4f0fb7a4636a899b5a9834df801be1308d234ce806e6af87cf50ba15695c706de436e1bb2c40dcd04af475ab5600c802e7f9b50ec05667f80c5e436ca772b215e99403a455d8e7108439f9ebb2e3f04392139168a5f0c82bb3922baaa6aec3c113b23d2e285b2e555de49adf1f0f60ee9594b017da1338de8b478fb2d73905b0a19ba083ac01d20101cf0a80bd476cddac75ee7d3d70b65582d62db1e757d3873a32b26df3596889d28a15b5ea945746826ded5c1dc9ba30e", 0xd6, 0x2000c000, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 832.673816][T24486] EXT4-fs (sda1): Ignoring removed bh option [ 832.709641][T24486] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 04:51:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x400, 0x10) [ 832.709641][T24486] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 832.709641][T24486] 04:51:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) [ 832.848724][T24486] EXT4-fs (sda1): re-mounted. Opts: noquota,bh,nouser_xattr,acl, 04:51:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:25 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfff, 0x2000) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1c, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x80, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 04:51:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) 04:51:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:25 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2083d, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000640)={r1, &(0x7f0000000700)=""/236}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000006c0)={0xffffffffffff8e75, 0x8}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000080)={r1, &(0x7f0000000100)=""/78}) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000680)={0x2, 0x43, 0x9}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}}}, &(0x7f0000000600)=0x146) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000500)=r3, 0x4) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000002c0)={0x1, 0x1, &(0x7f0000000180)=""/97, &(0x7f0000000200)=""/173, &(0x7f0000000340)=""/150, 0xd001}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}) [ 833.154303][T24759] EXT4-fs (sda1): Ignoring removed bh option 04:51:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_SECCOMP(0x15) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x202000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xd4, "e2d68478bb79b0f63472e42d5630fb63ae692ae36985d3089ad3ff9de233e6c3c2bd246577d2e18d5d56055576dcc00bd937fac4a6b6cf0eb70daf851ef9ead04e34558f88e008bdb3f10fbcdd88516185cab44bcfb61aea9c870c8c96049a628f861cc62c9402d570c89999d6fc771c579874d924b39935a4896087621a941d24f23c392ee5a8be9da06591b9523a1ad80958ceef78fef3d91ea472e7e2367078809c0ab71da2e29fc9ecc966894dee36605e3ce7e6ed2a4b320642a4bf94f1335da7abdd5c0fbf0efe08f0b09a63c9bc8b0b46"}, &(0x7f0000000180)=0xdc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0x47, "1f36dd973dfc8fede5b1db11c7ed98cb5d525f4b984d106a5f282eeba0c560fcad85b9421d4833b99e44cfd841e74faf80cf412efe29ea63f25dd835a42267ec80484eb1ebe132"}, &(0x7f0000000240)=0x4f) 04:51:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}]}) 04:51:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40400, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x2, 0x1, 0x1, 0x1, 0xc, 0xf, 0x0, 0x3}}) 04:51:25 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x101000) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000100)={0xffffffffffffff00, {{0xa, 0x4e22, 0x6, @mcast1, 0x8}}}, 0x88) 04:51:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x109000, 0x0) open_tree(r1, &(0x7f00000001c0)='./file0\x00', 0x100) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="fd8cd47beb3bb0e503cba3e66f9c5895e6ede2a5e836949bada0", 0x1a, r0) times(&(0x7f0000000180)) 04:51:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}]}) 04:51:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:26 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x8001, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x100000000, 0x0, 0x7, 0x2}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:26 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1c, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:26 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffffffc, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) 04:51:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@bh='bh'}]}) 04:51:26 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x404901) accept4$nfc_llcp(r0, &(0x7f0000000040), &(0x7f0000000100)=0x60, 0x80000) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x1}) 04:51:26 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x8800) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) socket$inet(0x2, 0x5, 0x5) 04:51:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20480]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:26 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x1}) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/208) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x6002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x54, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5c}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x40) 04:51:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:26 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x5}, 0x4) 04:51:26 executing program 2: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x101, 0x1) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x10000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000180)={0x5}) 04:51:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c562c70ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 04:51:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@nouser_xattr='nouser_xattr'}]}) 04:51:26 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7ffffffd, 0x30500) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETLINK(r1, 0x400454cd, 0x7) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 04:51:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x20, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@nouser_xattr='nouser_xattr'}]}) 04:51:27 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x800000000000080) 04:51:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:27 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) 04:51:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@nouser_xattr='nouser_xattr'}]}) 04:51:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:27 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xb38ba4cdc0fdad1b) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x500, 0x0) move_mount(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0/../file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x8001000008912, &(0x7f0000000040)="0800b5255e0bcfe87b0071") sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002c40)={0x0, 0x0, &(0x7f0000002c00)={0x0}}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000080)="240000001a005f0414f9f407000904000a00000000000000000000000800080000000000", 0x24) 04:51:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4e0b, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) 04:51:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:27 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x44, 0x0, &(0x7f0000000280)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000140)}}], 0x2, 0x760000, 0x0}) 04:51:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1030000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:27 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000001}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x108, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000300)) 04:51:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x20) 04:51:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="b14b5bcc07ca67570651c184f35bdc07000000000000003206e07310b5945b15672c27a861488cf0dd015c288a5879ff85f7"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000380)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:51:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 835.646307][T26907] binder: 26905:26907 ioctl c0306201 20000180 returned -14 04:51:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(0xee01) setuid(0x0) 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:28 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0xff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) open(&(0x7f00000000c0)='./file1\x00', 0x40, 0x2) 04:51:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:28 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) times(&(0x7f0000000000)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x240002, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000080)={0x2}) 04:51:28 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) keyctl$KEYCTL_CAPABILITIES(0x1f, 0xfffffffffffffffe, 0x0) 04:51:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:28 executing program 3: 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:28 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x101000) r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x2, 0xc0800) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x7}) read$FUSE(r0, &(0x7f0000000340), 0x1000) 04:51:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:28 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 04:51:28 executing program 3: 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:28 executing program 3: 04:51:28 executing program 4: 04:51:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:28 executing program 3: rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2@\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1eu\xa1T\xd7d\x9a`=^h\x8c8\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\xd5\x16\xde\xa09\xe2\xaa\x90\x958\xd6\xe6', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) 04:51:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x600400, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000080)={0x2}) 04:51:28 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="97fe19b8f458b6", 0x7, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r1, 0xbd, 0x30}, &(0x7f0000000140)={'enc=', 'oaep', ' hash=', {'nhpoly1305\x00'}}, &(0x7f00000001c0)="997f3a982ebff51d4a086c5d8e5d3b3be4a3e370d9ec131273e848f7b9cd1bc94ec673a6572de324eb29a41e151f1ca50f1f3db635ba2d16876588df246ed9e3f7b5df799a69e7a61428993f79fb8cc0dfc2bc8d4c8447b6fdb0978c34961d64c005d25a1655f193556c5e660b8ed0546b32d160935c8cbc6cd037066c204cd16f449a95eb70b7399034a53adf108b469b2d0afda6ec146a0ab6339c8c9b07a1152373a795b49efac558a3f02d005609b193612bdbc371af568bf1ba67", &(0x7f0000000280)=""/48) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560a84ed7a80ffe00600000f00000000a2bc5603ca00000f7f89000000200006000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 04:51:29 executing program 3: 04:51:29 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:29 executing program 4: 04:51:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000000c0)={'bridge_slave_1\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) recvfrom(r1, &(0x7f0000000040)=""/54, 0x36, 0x40000000, &(0x7f0000000100)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ni\x00'}, 0x80) 04:51:29 executing program 3: 04:51:29 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x8000007}) 04:51:29 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:29 executing program 4: 04:51:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:29 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40, 0x0) sendto$rxrpc(r0, &(0x7f00000001c0)="436a72ee6ca5fe88a357fa4ebdb8bcba0d3f09de662bc1092c3e75bb89d2eb95e21d0c00e3aba6ea0de4a61b4f7fbb8c2d79c299cdd7265d58bc8656f87cda2fac7b909b7b5bb39032e02049fa17dda12af26b2f14a1015189e296f745c2f9b93f3278fde2f58ab212c4b6354b8d523aaea38f8343be80b68854b8a21fdb25da0ee3dc9d3b4e48e461302d9414dbdf302af174dcd00f4bb97a96097e2f", 0x9d, 0x20004000, &(0x7f0000000280)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}}, 0x24) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="ae33b0978c086c39a4969b077c50f3b8bb5c770fc8936992ef48fdd6d335b63b3385890a3f3067055160f182f61557947e5acd7fc7703ee37da40488411c3eeb13f44104eee8", 0x46}], 0x1, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x7}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000180)=0x5, 0x4) 04:51:29 executing program 3: 04:51:29 executing program 4: 04:51:29 executing program 4: 04:51:29 executing program 3: 04:51:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x1, 0x80) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x10010, r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x408000, 0x0) sendmsg$netlink(r1, &(0x7f0000001640)={&(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfd, 0x10410020}, 0xc, &(0x7f0000001600)=[{&(0x7f00000001c0)={0x10, 0x16, 0xc30, 0x70bd2b, 0x25dfdbfb}, 0x10}, {&(0x7f0000000200)={0x360, 0x3a, 0x421, 0x70bd28, 0x25dfdbfd, "", [@nested={0x21c, 0x80, [@typed={0xc, 0x41, @u64=0x7fff}, @typed={0x8, 0x6b, @ipv4=@broadcast}, @typed={0x68, 0x14, @binary="2b52de44233a5325f5290db4f64b12bcc75e655351ccbd5012716f9a132f058cefd9c2f27261e9609722df25b878435d5544c0de8901b959b7ee713ec62fc2cffa9bf77f2926b99555584ed76ca7bfc1580c143d37ae0c91d0036410fed277fc74"}, @typed={0x8, 0xd, @fd=r0}, @generic="be8003fdb4a5d996975391a4f883a6dd8be84e47f3cd38e616e59b3dbbb0d9606dc69c172417536753e189d8b2c7a34a89a9d252b43e6b24c444fc5bc9185910d9b33c637a24a059f843a4ad9a11dc2e1d7550849c04a7101bf09bb2026c9b451ed2bdded90c36feb47be91b13e661c4d77c9e25f908f25e334d5756b45bf565461289b1dc320b2e927fcd9cbda383b58b6aab07ba7669d700b663fc853d8193bb8a33d8dc562f22b76c456afe5d9be6a3553ef8f3e5f8271e", @generic="e28a056bb3f8e80b3c1737ec8ace022e26aca283790a4a50268f9cee6613a54adbfbb1cfdad2fe43193fa76a39bfd5ee72412342ff0885cc8d0414354fc6bf20db1f295fc5368fbfa4ce328774011bea89414cb02081d3b7d6c05c9fbbc0c5b55cf04d474de5f150509faea49334874c20fe375f911b239c54f67ee0cc995b1a6017d8d63da6e833bfda27570ca118b8a2e3f9e8b0656224e4b463d8ae7f31bb830b03bb898970c1", @typed={0x8, 0x37, @u32}, @typed={0x28, 0x52, @binary="b7c43c6b92798b6c3e2bad533dbeed4808683e195368dca9b35219c62af94d1662"}]}, @generic="a8946b147e965e6e4c188ac22ff68de6b01a1d6048b9755f008d4f47a05d512d3da5353ddb6b26b8cafc6b47303d89f8a364bfd0d3d6919aef2d4d798dcdda75767c19d5af9a590061bbebfdbf0bac074e8f14fe0d51690f69b51f2f0ae8ab3a9f889650d5431d9f7683d062f5c5adcbf9eb52389878203cf012ad2c795f47df850d8eaa838d118eaecedd81f08784578b45c7760babe6a5f8fc7cffdb470d790b4b9cc9c9302e24f9e2f1ca6bd217d51f29a3cc8be2787238e2aea452648a139cb769b36216cabe4bfa2c4023293f29e98ea3d8d0648f262d689915a20bfcdae5", @generic="c7f3301c5830c79df96a8bdfb61b225dbef26a18770102eaa4d280982a2d1c180d2e77b91f233df1c4fcff4a10c509bb991a9b067e680826753162292cceecdb3f22c6ab5db4093963b344b2f11421d463d474"]}, 0x360}, {&(0x7f0000000580)={0x1070, 0x18, 0x8, 0x70bd26, 0x25dfdbfe, "", [@nested={0x1060, 0x5d, [@generic="fa44482d9a0a1a47d6eaa79931212164990946462043ddd448c82815c794d6690ad84fb236ade43a43d59057287be0af5aa00cea62ff17d9fbaa1dad7c15e283cccc8335266518c5ba25ea8e1031bb", @typed={0x8, 0x24, @fd=r1}, @typed={0x1004, 0x3e, @binary="4035e560338c30b0aafaace3ca8edba5d7c4bd393d6a39d7265d07bbf1f580198d713673952920033dcbc09c2162c20a333976c38ef01be9aefd24c922b85a8164b5f3c10b917ecd917084a31ba346b57a81da927e3df2e3da92cea26ead470803069a4e7a7d8661ecbaf9cd587276b59dcde37ebaf40713a29171d5c0fd9f1fd62b7c805fff1028b2d70446522bdcfeece73a942b9b9b76349615990f08842c19f29616655b3cd85edb6324a145872bf847b86a62014b49a7278168c2c2eb3683ec5680b8406f80f31232db06a694d0f316f67db711d4707f8475f46e7d351582667bd4c77454aa7e696813a18e78d4d2c53b632617243453432f61c63a988828b8515a2966b3f7abc52aab9e769812eb2c871df9abac6ca1bca7d95d29d6ba2be45267bdcb7bc785f53b89ac7979d7a4d338ad7f400fc6fc3947c078686f3c157ed5408dbe1e3fe391eeef34f4cf30a18d59c04dee09f005731e28f57f2e5a5232ea8df49507b02ed5be0ec697ec71f192a9721fde0cad8f54530e6f646e509b46383745ad25246cd2580ecf2a897fd6f24eda3f526a299fb3daeeeb24ac7528190353a15912559658d4075d0b08cf3cdffc52b080f64257c6e4899ad3a8b157c73393aa84c7f7a75c30bacb75069e27980e2ae38db48997f15cf67aeb3f132fdd8e3fff671b72390231900ab9ee9340844d40b232851783e1dbb70de6d7a56edcdf833a10bfbd66746494fbcf80dfa96c9625a3f18ec9be3f9c94b676c54a499810c160ce3c04941d9d5733fd35c01d2afb2c6268e829449bd7be5579fcaffe0aebfe68a52b9dd62ef599aec6f1a0f720d2f8d6e5f360992c399fdb7be6106586ed8c4c7d9fb3eab157e9b7d025051e0f6c27f82e6c2e0e3690af0446b17ae328053e9b3fe24a7850f17570326ea189110ac6276097d321919c7ac62aacee35c9b45a6cbd1ffc992457f69132da27f602ab8190943cece764fa42b4a5130cd5d62e76cf37e1e3fd50943dfb1088457e3a45ee88b2986a881832f0b86b94ddc9a4196e2af4b567609b38ae2156e92cfa6a71b9db9bdd4f084f9b40998fe60885d69bb39bee0ae3f3e6057dfd9511d0ec27474284855a67e4e7dd2757e60604ccffed4f66137282dbf11ba23b4a47b8613f15c8d3353fbc880a110bd46912b82799ffc3a0b7126792adae794dcd4dcf74396e12168cd97ee0068fbcd3474f1a59497bfb5e89dc9e26c4d8d716738ed13ceca3e638f9e94070928bb4138e8b50ea71762af274f5f12349bf3d287d1d564d1cd5857fab05df84bf1069dde06e84205f51978545a07a650f80d06f965a4d7b8e8a014875ae2470b84d4c75bf8c2c59e190a01697446bc1a573c1daa116059e7f494d55dce47138505e03a16961248cb6718a9cadd6043de127011b42ea6acf187f59c0951d541a3b8924d3cecc1145febd1213eef074a7dd56f84ca25f22e782294b33923162aad76fa050a546689720bbf1c74c7d01c315a2a99c5e842e9cda2ad0dc1b9c0a7337e7958d7a5e7695f07f152feea778beba9a1cc5c3fc533d75d9b1f526cf96486d65bb5f2573bcab54bca823d5493ff3459b8a8c5327f886ef6f1eedec539bdec2588e4edcbed8694cae03b574fd7e5d0ee9bfb2494fa87ae59ed992db9d3a8dfb0815b6252c1c60391a3d2aaa49dc0d7a59be30cf8066a4f257277d78a639a79faf5b4c55a6bfd3691bd77fe72999d6c7a1041d9bc4ab3bc60988ce83c552a1525578078c1bf92da4bee58d38265cc129c5cf36100bea35967d98eb3381f795d95bee2bc73020348372eb17e091b77972311b56aef5c313f1804da650dad7d9a21f0a9d60ae35f915f9f88215752eb23e146bb1d9ebc4a3dd0f43a35fb7051af5065a14313c4ed2b54855c59182fda5ace609ec76a659e107a95ab10d3db0c759fb34ababcb822ad92875a00009c27c4eeb625071f560e3f396412e7d3c2e26d16df3709257f3f7733ed532606f2e8cfa6593d995941f187f148239f43086886f1abe28c502764179a93f90a5432fe73b7555e204f4a155ce4b30c904292ae39c362c0580e9dab01feeb5b15917cdfe7f77c5cfdb27e2ac775054d069289a2b617cb593a8ebae1db2f0fcfcc475e99c61907df625e26915032a3d909318ab1cd193a3b0a4942b4a872e02de8baee60716aacb848615acafbf85ba61c5050170c6bfa7dae3da4fa4a49197e4ebbb9c7d4d63faabb4654cb443634fd56786ad7f1141b6d512fd777b1467abf07a63f4e642f7219cff9c0b66520e09eae3e69d392fd0bad7b987ec579e19bd48a181e58d1d5247d60bceb30453245b07d162b49aecef3b0796da8d819ee55d8dab7f0044c97a0951f5c0f4ce22441bf0cf6ae2667490f20e380c2a0f97954470e06def40228bdf8124193feb1b2b9e655f3b8c9c4df6d57b56c0a0f612776f0613431c707e27c2802d786fc91f3edca204f4f590560ec5a18db3902e5b7a06c9cde786a815202ffee2516594bb8b83d899ff02e4a47647a3234143a2304054e7da6f25257690c472310b381ea1afab7b85c55585b772f7212a46e815ca9605a28b5fdcc912cadc429f8f1515ae2c601aaa3e5defd2c56b86c7ad92f07228f087fcc447d745e177c6e0fd330ef8ad53df7271f9ce423023e8cd20d18fd93d25e97b9a5f0f6a4a2668cc7c9bddd8ebc00d23795a88ac28efa78440c8c8fd4ca7707c0014f2af57a014f35b7d6a90e189bd44b09af64a238f3b8d4493a9167709ac72cc108f4d7d7c69b591ed31b9f24651ae9034483c57378b4da643181390cb9e6f22b8da88af474670b6a3948c53a5ec43426aeddd719855d82070e208f5703c113381f0f5eae85b36adcb1043ddb3fbfa546ff6c2d349f4005993df3efa1c281bc8e73d59fa594b98c49712ee610a59110453c25ca396445b0bbb580d5760059253c4d5fd7d41d2480cf35f661f666ecb258b3e45c75e852d4eacc806aa29258f93dabf8050bb916930c3951ab0b9839fa7e0186be9911c5b0c47bb3dfa8cdf8d58790f780db4aafe79cf9015949eebef7c0a25ce11240a431b21406f6fd0acc9c0f6a7eca7d3a30dd1f40b2b4c210ef62a7f2634652cb3126bd692d23cd203203997dcee6bc08fd799aae5b82061ed920f05405f085535f1a1e98b4b763be8d3941d519a832d425900ab973d6f989c0023bca4cac3b7de21fd374279eae1506c43863368e6c38d15ccee922623e540a7f49af580e8f9206761bc63a5874d9468e9949281a2556d0d4044ae0adc607b63a76534342e75af0b38baaa895d671e9d2d74d1e91f23c3bccbd5db96e9f965f988e31ae3c21fcf86d93b4eda6ce8345551cea05e74c540d693e368538982c22491787e35c7f3ded3acd3f4d66f9893f2c5cd57a92f5bc328932ae96ae97512a5e3de3082702edff0e68e9a271a36294acb451cf0ab54c4995831cf6ccf897beb27b0c96d582d9b519fc267341bd41dd23d02c507ac2c0db14579ce40251c44751a07da0c12548dafa8298322de0adc87f21f708a867121b28d7fc1770c835f622e1cca798a2bb18222c9a8e3e4df159d15156bfc6ad8aa399e68c82302a72601073ad057f72251d1a876050930d0580cb883e873fd51aeb254937656ecd9fc249c31d0e9b92da3135159583fd67bcf9e1b82ede37b75e666afcc47fd2e4aaa61071b52438174fbe32cadddd007250a987b78d905cb1d557c52e97f2c8e67e288c5479074a869c6996a7321626fb19d8b0cced1788f128ba36abec155e1c9a997458729fa3f73b7cfe3eb3740cbee086569b8dbadc44277ece346f5b98d88024fd5098be44e3081124521377996f5190ec5e6301928e996cb1535dc17ed9f74c5b3566dae99c88719f900b7c9cd04aa9dee2a80e8c1bc52067e393e18c1c9f9599218ed82af91b43dd3cdee3148b94d2059d609714d2e3883772ef5f505f2d53f1d3b4ad1291eea1510313a05f605c85f98e3293c1886f9ea7c8e2f266a1d636812f8e3f0c83342509be0deed92d4ad9042eecc5416fc87a4bee896c7d7737cf25ac04cb19a5996e49ef14631df7eb7eee83b8338070f89c8d2bfd401b647ccfe3370f9c1feec85b739b68f077a22cfcb1d57c933c9157606de187efdc3eb1545f1400200ee3e1ec45d15481fbdff66d70c1770481d023082a4bf82203930e89049849c9ecd93c95028322162a1c2de531d756800a98f0715f5ae74c0fb591aaa86441cf70c06bc439f090b4cb081913a920aff9c0a5cf01b44e26ba03edfaa8d7c1facf117a0ac39951860594eeb14c59faf0898d6742a0d6ea23abebbc3a474d02243619fe980d845df6211ca23c51341e243f6fd36cf308fde725f213a7be26773f03b91a635a21400b00d3047a5558782836961eae5d0cf5d58eb71f136dbad0d685780c87fa96d67cb7ba7ec109108c6bcb7894593354c661548d9057fbe29b8937b5b58e0323ed8c805d20e5385821be4f613ad9eda4aaf0c7be176476cfdee4183606c29c75f37575478928931c8df247e76d4a5ce91a513776967616df25e5bf2bc19e65d30828f894644c96309228968bc230f1b3aa75eafc9844aa39baeea1069702871881610e47299e5267958bdab0a98a92702605fed155918d7c1bc043f10c12bd4067c23368f4745134658cd70348e8c907f8bd2eee1513beace2a9457c95886702ea61cd0b3d4d26a5b003b6b4b35b4960d22f74fb03fe8786aae91dcbe8450c83046a83f64cbd86a0ce85bb1f7e3adb4db521872d72aa0386d740533fa1528b99dbe8ea1a4be118fb2b67eb685b84bf7d7625dd06e7d2c2dcd5297e5d6745aa367866b0b4ea16518a152f5ab0154425dc06dfe33223576667d650bad2956fe3abb299c9e4f8e06895aca42587fe811e8b0f6fe2fc7f485e4f11590bfd70db843c0d8d7f2f5215649a97697620146e1b91c048345d01343fcd402e4885441da48d1c9aed8d2995067fb65e1b325e076078a0614d3cf87dfd6677c59abea295d073c4a801ced7c3025ef320422424144d093899d5d6777d88f97e2f69a03fddfb5c2a1ed74b0c0a45860372b3de6d06d7b1ea2661829cd7f59af77f84872077953a0196ea7d042797b836a4b9b39af9f94ab9ce7e71f0e595489b9d97252a41d43cd3cab675eecef40e8760ddba72522975bd77c49654932e2b2f5171e9f069090d63a7427f333906d101048941ca5a4ea82d9e68c46c984cd8b918d865237f7575d717b2e7bc88bfde900cf6d980e26ce9713150d90866ab396c321c221ff927e507b71a61bd8868daaaecc1a046a4204aad520b0f875df80023cf1f2bbe2792091e50a55542498c517b8f8f736f31b25f7de44904e19064d563ce841204fa8d53ee15b8d6659b9a7b68bfbcf808ff8efad4fc1e9844ee923844b24c13c299e74522312e3a131dbe2b1204ab2bd1318195c2050b7f8fb6340064a4794ae0f42f6922f86d8b20ff4f9b16c2202e11c2f7bb4ff068400e9193a3788a95b5c6584a611ced2762e65219fac572a0d01df349dce9f2a8db899d6be6b7cced6332d95513d78a8301e37b38de3ed616353549c9eb3cd8a2467dcabfb1ca1ed07196c6ed5302a184a581e3391b6e743856affebd2a976e453591c01f972ee33ca83c0c7c38c26b4b9cba2161c6a1579a77b6df66ae1ad4cdf23470554e04294a38f5f0ea98b15e16f525d8e80d2f7e8f347fe3f3a8e8f192d8bcb8a152b2366224d342dd64e947d941e55a361189995682a313758cb3d112282eb3daabc464ad2dc38d3b8c784"}]}]}, 0x1070}], 0x3, 0x0, 0x0, 0x4004001}, 0x4) syz_open_dev$mice(&(0x7f0000001680)='/dev/input/mice\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000080)=@x25={0x9, @remote}, &(0x7f0000000100)=0x80, 0x80800) 04:51:30 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:30 executing program 3: 04:51:30 executing program 4: 04:51:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:30 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffe, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) socketpair(0x9, 0x800, 0x9, &(0x7f0000003100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x1) 04:51:30 executing program 3: 04:51:30 executing program 4: 04:51:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:30 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:30 executing program 4: 04:51:30 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x9, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:30 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x1) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x3, 0x0, &(0x7f00000000c0)=""/133, &(0x7f0000000180)=""/130, &(0x7f0000000240)=""/173}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) dup(r1) sync() 04:51:30 executing program 3: 04:51:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:30 executing program 4: 04:51:30 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:30 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x10bf, 0x22800) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@loopback, 0x0}, &(0x7f0000000140)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000180)={@ipv4={[], [], @local}, r1}, 0x14) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)={0x0, 0x8}) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x200000) 04:51:30 executing program 3: 04:51:30 executing program 4: 04:51:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:30 executing program 3: 04:51:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e22, 0x2, @loopback, 0x12e4}, {0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x7, [0x6, 0x3, 0x100000000, 0x401, 0x3, 0x3, 0x3, 0x7fff]}, 0x5c) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) 04:51:30 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:30 executing program 4: 04:51:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:30 executing program 3: 04:51:30 executing program 2: setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=@random={'os2.', '\x00'}, &(0x7f0000000240)='/dev/dri/card#\x00', 0xf, 0x1) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x2000) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}, 0x0, 0x1f, 0x0, "8395b5a7065deb8f351ffc3cdc7a3959003a1326f081b9f8f679656b421aa8dc0b11ee248c0df9bd962087c3b438f728a56f48abef9ab802824eac2857319815bb365775e179f3cd428104ea35f75793"}, 0xd8) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x8c3, 0x6000000, 0x3, 0xb8c, 0x13, 0x100, 0x101, 0xfc00002000000000, 0xffffffffffffffe1, 0x9}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:30 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 04:51:30 executing program 4: 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:31 executing program 4: 04:51:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) 04:51:31 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40008, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x101, @local, 0x8}, 0x1c) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:31 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0xb, @pix_mp}) 04:51:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) uselib(&(0x7f0000000040)='./file0\x00') 04:51:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) lstat(0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getpgid(0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x20006, 0x0, 0x0, 0xfffffffffffffffb}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000400)='./file0\x00', 0x9) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x0) fallocate(r4, 0x0, 0x0, 0x800fffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x0, 0x8}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$P9_RREMOVE(r5, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) setregid(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0xc8, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e20, 0x6, @local, 0xd7}, 0x1c) preadv(r6, &(0x7f00000017c0), 0x1fe, 0x400000000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x7fff, 0x0) 04:51:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x48000000101a0}]) 04:51:31 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) ioctl$TIOCSBRK(r0, 0x5427) eventfd(0x0) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffedd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 839.124445][ T26] audit: type=1326 audit(2000004691.403:2628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28932 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0xffff0000 04:51:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 839.202651][ T26] audit: type=1326 audit(2000004691.462:2629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28932 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0xffff0000 04:51:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 04:51:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x900) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x2, {0xa, 0x4e24, 0x400, @ipv4={[], [], @rand_addr=0x4}, 0x3f}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 839.418335][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 839.424188][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 839.430015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 839.435762][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:51:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:31 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 839.750664][T29146] FAULT_INJECTION: forcing a failure. [ 839.750664][T29146] name failslab, interval 1, probability 0, space 0, times 0 [ 839.808120][T29146] CPU: 0 PID: 29146 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 839.817271][T29146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.827331][T29146] Call Trace: [ 839.830634][T29146] dump_stack+0x172/0x1f0 [ 839.834974][T29146] should_fail.cold+0xa/0x15 [ 839.839602][T29146] ? fault_create_debugfs_attr+0x180/0x180 [ 839.845411][T29146] ? page_to_nid.part.0+0x20/0x20 [ 839.850439][T29146] ? ___might_sleep+0x163/0x280 [ 839.855297][T29146] __should_failslab+0x121/0x190 [ 839.860235][T29146] should_failslab+0x9/0x14 [ 839.864749][T29146] __kmalloc+0x2e0/0x770 [ 839.869004][T29146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 839.875271][T29146] ? fput_many+0x12c/0x1a0 [ 839.879690][T29146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 839.886100][T29146] ? strnlen_user+0x1ed/0x2e0 [ 839.890779][T29146] ? __x64_sys_memfd_create+0x13c/0x470 [ 839.896327][T29146] __x64_sys_memfd_create+0x13c/0x470 [ 839.901697][T29146] ? switch_fpu_return+0x1fa/0x4f0 [ 839.906896][T29146] ? memfd_fcntl+0x1580/0x1580 [ 839.911665][T29146] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 839.917757][T29146] ? trace_hardirqs_off_caller+0x65/0x230 [ 839.923474][T29146] ? trace_hardirqs_on+0x67/0x240 [ 839.928506][T29146] do_syscall_64+0xfa/0x760 [ 839.933012][T29146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.938900][T29146] RIP: 0033:0x459829 [ 839.942793][T29146] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 839.962396][T29146] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 839.970804][T29146] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 839.978775][T29146] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 839.986747][T29146] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 839.994722][T29146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f959e2f56d4 [ 840.002698][T29146] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 840.022645][ T26] audit: type=1326 audit(2000004692.285:2630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28932 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0xffff0000 04:51:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x6}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5d2, 0x8000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x4d4c9d3d, 0x1d, 0x100, 0xfff, "01a457f8c3e66e3c0228a75393abc440a65b09aa50aac27126bfb207d60510f2"}) bind(r1, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @broadcast}, 0x4, 0x0, 0x4, 0x3}}, 0x80) 04:51:32 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:32 executing program 3 (fault-call:5 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:32 executing program 1 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 840.312515][T29267] FAULT_INJECTION: forcing a failure. [ 840.312515][T29267] name failslab, interval 1, probability 0, space 0, times 0 [ 840.344673][T29280] FAULT_INJECTION: forcing a failure. [ 840.344673][T29280] name failslab, interval 1, probability 0, space 0, times 0 [ 840.364537][T29267] CPU: 1 PID: 29267 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 840.373666][T29267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.383718][T29267] Call Trace: [ 840.387031][T29267] dump_stack+0x172/0x1f0 [ 840.391387][T29267] should_fail.cold+0xa/0x15 [ 840.395984][T29267] ? fault_create_debugfs_attr+0x180/0x180 [ 840.401800][T29267] ? page_to_nid.part.0+0x20/0x20 [ 840.406836][T29267] ? ___might_sleep+0x163/0x280 04:51:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 840.411690][T29267] __should_failslab+0x121/0x190 [ 840.416632][T29267] should_failslab+0x9/0x14 [ 840.421137][T29267] __kmalloc+0x2e0/0x770 [ 840.425384][T29267] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 840.431625][T29267] ? fput_many+0x12c/0x1a0 [ 840.436046][T29267] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.442287][T29267] ? strnlen_user+0x1ed/0x2e0 [ 840.446971][T29267] ? __x64_sys_memfd_create+0x13c/0x470 [ 840.452524][T29267] __x64_sys_memfd_create+0x13c/0x470 [ 840.457900][T29267] ? switch_fpu_return+0x1fa/0x4f0 04:51:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 840.463015][T29267] ? memfd_fcntl+0x1580/0x1580 [ 840.467788][T29267] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 840.473859][T29267] ? trace_hardirqs_off_caller+0x65/0x230 [ 840.479586][T29267] ? trace_hardirqs_on+0x67/0x240 [ 840.484619][T29267] do_syscall_64+0xfa/0x760 [ 840.488341][T29347] FAULT_INJECTION: forcing a failure. [ 840.488341][T29347] name failslab, interval 1, probability 0, space 0, times 0 [ 840.501683][T29267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.501694][T29267] RIP: 0033:0x459829 [ 840.501709][T29267] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 840.501716][T29267] RSP: 002b:00007f258729ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 840.501728][T29267] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 840.501736][T29267] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 840.501743][T29267] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 840.501756][T29267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f258729f6d4 [ 840.501763][T29267] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 840.518110][T29280] CPU: 0 PID: 29280 Comm: syz-executor.3 Not tainted 5.3.0-rc1-next-20190726 #53 [ 840.547828][T29280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.547834][T29280] Call Trace: [ 840.547857][T29280] dump_stack+0x172/0x1f0 [ 840.547877][T29280] should_fail.cold+0xa/0x15 [ 840.547899][T29280] ? fault_create_debugfs_attr+0x180/0x180 [ 840.616851][T29280] ? ___might_sleep+0x163/0x280 [ 840.621711][T29280] __should_failslab+0x121/0x190 [ 840.626657][T29280] should_failslab+0x9/0x14 [ 840.631161][T29280] __kmalloc+0x2e0/0x770 [ 840.635410][T29280] ? mark_held_locks+0xf0/0xf0 [ 840.640180][T29280] ? _parse_integer+0x190/0x190 [ 840.645036][T29280] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 840.650764][T29280] tomoyo_realpath_from_path+0xcd/0x7b0 [ 840.656313][T29280] ? tomoyo_path_number_perm+0x193/0x520 [ 840.661953][T29280] tomoyo_path_number_perm+0x1dd/0x520 [ 840.667414][T29280] ? tomoyo_path_number_perm+0x193/0x520 [ 840.673572][T29280] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 840.679386][T29280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.685637][T29280] ? __kasan_check_read+0x11/0x20 [ 840.690680][T29280] ? __fget+0x384/0x560 [ 840.694853][T29280] ? ksys_dup3+0x3e0/0x3e0 [ 840.699284][T29280] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 840.705529][T29280] ? fput_many+0x12c/0x1a0 [ 840.709954][T29280] tomoyo_file_ioctl+0x23/0x30 [ 840.714734][T29280] security_file_ioctl+0x77/0xc0 [ 840.719676][T29280] ksys_ioctl+0x57/0xd0 [ 840.723841][T29280] __x64_sys_ioctl+0x73/0xb0 [ 840.728438][T29280] do_syscall_64+0xfa/0x760 [ 840.732950][T29280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.738844][T29280] RIP: 0033:0x459829 [ 840.742741][T29280] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x521e, 0x6) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)={0x3}) 04:51:33 executing program 1 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 840.762346][T29280] RSP: 002b:00007f47ea62ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 840.770764][T29280] RAX: ffffffffffffffda RBX: 00007f47ea62ec90 RCX: 0000000000459829 [ 840.778737][T29280] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 840.786711][T29280] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 840.794687][T29280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f47ea62f6d4 [ 840.802677][T29280] R13: 00000000004c456a R14: 00000000004d8750 R15: 0000000000000005 [ 840.830046][T29347] CPU: 1 PID: 29347 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 840.839186][T29347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.849234][T29347] Call Trace: [ 840.852537][T29347] dump_stack+0x172/0x1f0 [ 840.857477][T29347] should_fail.cold+0xa/0x15 [ 840.862078][T29347] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.868035][T29401] FAULT_INJECTION: forcing a failure. 04:51:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) ioctl$void(r0, 0x5451) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000100)=""/246, &(0x7f0000000040)=0xf6) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000540)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0xdf, 0x2, 0x0, "6694ad5ded835aaea2e97f621594a1d2", "a9c1e1e26d47deb3337cf9643f0941d8ca15690b5980b4f584c4115aa5920cead6f0f5fa1e21b8feeddee982661a997436cf6ae455d28f9ab949eac8dc865a924d7c537ead2bcfa13c332774334e701eeac341b21f9f2f5a229d99277542e3e8cd824ec679a2d6e1dbd6143b761bfc00de3d0e30181d600539b1746581aaac825c916d5618b8b84d0538695aad637ea926ab267ff98ebfad40669a3449082726d1656d14a8efcc87ad19809b6fef9bbb51e46fa8f4fce90f79e43cb19fe608978537bd54470f513c34b3"}, 0x44e, 0x1) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000500)={0x2, &(0x7f0000000340)=""/6, &(0x7f00000004c0)=[{0xffffffffffff7fff, 0x7f, 0x0, &(0x7f0000000380)=""/127}, {0x100000001, 0x90, 0x1, &(0x7f0000000400)=""/144}]}) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x408000) [ 840.868035][T29401] name failslab, interval 1, probability 0, space 0, times 0 [ 840.868151][T29347] ? fault_create_debugfs_attr+0x180/0x180 [ 840.868171][T29347] ? page_to_nid.part.0+0x20/0x20 [ 840.891566][T29347] ? ___might_sleep+0x163/0x280 [ 840.896430][T29347] __should_failslab+0x121/0x190 [ 840.901371][T29347] ? shmem_destroy_inode+0x80/0x80 [ 840.906484][T29347] should_failslab+0x9/0x14 [ 840.910986][T29347] kmem_cache_alloc+0x2aa/0x710 [ 840.915840][T29347] ? __alloc_fd+0x487/0x620 [ 840.920351][T29347] ? __kasan_check_read+0x11/0x20 [ 840.925560][T29347] ? shmem_destroy_inode+0x80/0x80 [ 840.930680][T29347] shmem_alloc_inode+0x1c/0x50 [ 840.935443][T29347] alloc_inode+0x68/0x1e0 [ 840.939775][T29347] new_inode_pseudo+0x19/0xf0 [ 840.944452][T29347] new_inode+0x1f/0x40 [ 840.948522][T29347] shmem_get_inode+0x84/0x7e0 [ 840.953198][T29347] __shmem_file_setup.part.0+0x7e/0x2b0 [ 840.953215][T29347] shmem_file_setup+0x66/0x90 [ 840.953244][T29347] __x64_sys_memfd_create+0x2a2/0x470 [ 840.953260][T29347] ? memfd_fcntl+0x1580/0x1580 [ 840.953278][T29347] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 840.953298][T29347] ? trace_hardirqs_off_caller+0x65/0x230 [ 840.979640][T29347] ? trace_hardirqs_on+0x67/0x240 [ 840.979660][T29347] do_syscall_64+0xfa/0x760 [ 840.979682][T29347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.000755][T29347] RIP: 0033:0x459829 [ 841.004655][T29347] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.024255][T29347] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 841.024270][T29347] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 841.024277][T29347] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 841.024286][T29347] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 841.024293][T29347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f959e2f56d4 [ 841.024301][T29347] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 841.076364][T29401] CPU: 0 PID: 29401 Comm: syz-executor.1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 841.085492][T29401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.088415][T29280] ERROR: Out of memory at tomoyo_realpath_from_path. [ 841.095570][T29401] Call Trace: [ 841.095598][T29401] dump_stack+0x172/0x1f0 [ 841.095617][T29401] should_fail.cold+0xa/0x15 [ 841.095632][T29401] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.095647][T29401] ? fault_create_debugfs_attr+0x180/0x180 [ 841.095667][T29401] ? page_to_nid.part.0+0x20/0x20 [ 841.132103][T29401] ? ___might_sleep+0x163/0x280 [ 841.136953][T29401] __should_failslab+0x121/0x190 [ 841.136970][T29401] ? shmem_destroy_inode+0x80/0x80 [ 841.136985][T29401] should_failslab+0x9/0x14 [ 841.137004][T29401] kmem_cache_alloc+0x2aa/0x710 [ 841.151512][T29401] ? __alloc_fd+0x487/0x620 [ 841.151528][T29401] ? __kasan_check_read+0x11/0x20 [ 841.151549][T29401] ? shmem_destroy_inode+0x80/0x80 [ 841.170992][T29401] shmem_alloc_inode+0x1c/0x50 [ 841.175770][T29401] alloc_inode+0x68/0x1e0 [ 841.180100][T29280] input: syz0 as /devices/virtual/input/input868 [ 841.180117][T29401] new_inode_pseudo+0x19/0xf0 [ 841.180134][T29401] new_inode+0x1f/0x40 [ 841.195201][T29401] shmem_get_inode+0x84/0x7e0 [ 841.199882][T29401] __shmem_file_setup.part.0+0x7e/0x2b0 [ 841.205433][T29401] shmem_file_setup+0x66/0x90 [ 841.210116][T29401] __x64_sys_memfd_create+0x2a2/0x470 [ 841.215660][T29401] ? memfd_fcntl+0x1580/0x1580 [ 841.215676][T29401] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 841.215697][T29401] ? trace_hardirqs_off_caller+0x65/0x230 [ 841.232218][T29401] ? trace_hardirqs_on+0x67/0x240 [ 841.232240][T29401] do_syscall_64+0xfa/0x760 [ 841.241767][T29401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.247655][T29401] RIP: 0033:0x459829 [ 841.251550][T29401] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.271156][T29401] RSP: 002b:00007f258729ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:51:33 executing program 4 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 841.271170][T29401] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 841.271178][T29401] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 841.271185][T29401] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 841.271192][T29401] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f258729f6d4 [ 841.271200][T29401] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:33 executing program 3 (fault-call:5 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:33 executing program 1 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000040)={0x3e, &(0x7f0000000000)="a563cdf93172401029f57a2492df89d247fe731b5d48cf65ffaaaa56a1e78fb9ef9bff6412289d65e7a26ad94679322442f12039295125cfaaf6190c4d9b"}) fdatasync(r0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000340)="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", 0x1000, 0x0) keyctl$read(0xb, r2, &(0x7f00000001c0)=""/3, 0x3) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c00000023000000579a3c00000000c5da3668bbac6f1fedebe3a794"], 0x1c}, 0x1, 0x6087ffffffff}, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) [ 841.448527][T29611] FAULT_INJECTION: forcing a failure. [ 841.448527][T29611] name failslab, interval 1, probability 0, space 0, times 0 [ 841.570678][T29661] FAULT_INJECTION: forcing a failure. [ 841.570678][T29661] name failslab, interval 1, probability 0, space 0, times 0 [ 841.598638][T29611] CPU: 0 PID: 29611 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 841.607762][T29611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.617828][T29611] Call Trace: [ 841.621134][T29611] dump_stack+0x172/0x1f0 [ 841.625477][T29611] should_fail.cold+0xa/0x15 [ 841.630093][T29611] ? fault_create_debugfs_attr+0x180/0x180 [ 841.635910][T29611] ? page_to_nid.part.0+0x20/0x20 [ 841.640935][T29611] ? ___might_sleep+0x163/0x280 [ 841.645799][T29611] __should_failslab+0x121/0x190 [ 841.650746][T29611] should_failslab+0x9/0x14 [ 841.655265][T29611] kmem_cache_alloc+0x2aa/0x710 [ 841.660129][T29611] ? lock_acquire+0x190/0x410 [ 841.664820][T29611] ? current_time+0x6b/0x140 [ 841.669426][T29611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.675685][T29611] ? timespec64_trunc+0xf0/0x180 [ 841.680630][T29611] __d_alloc+0x2e/0x8c0 [ 841.684804][T29611] d_alloc_pseudo+0x1e/0x70 [ 841.689325][T29611] alloc_file_pseudo+0xe2/0x280 [ 841.694183][T29611] ? alloc_file+0x4d0/0x4d0 [ 841.698697][T29611] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 841.704942][T29611] __shmem_file_setup.part.0+0x108/0x2b0 [ 841.710662][T29611] shmem_file_setup+0x66/0x90 [ 841.710682][T29611] __x64_sys_memfd_create+0x2a2/0x470 [ 841.710703][T29611] ? memfd_fcntl+0x1580/0x1580 [ 841.725992][T29611] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 841.732070][T29611] ? trace_hardirqs_off_caller+0x65/0x230 [ 841.737796][T29611] ? trace_hardirqs_on+0x67/0x240 [ 841.742826][T29611] do_syscall_64+0xfa/0x760 [ 841.747348][T29611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.753258][T29611] RIP: 0033:0x459829 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 841.757154][T29611] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.776757][T29611] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 841.785169][T29611] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 841.793140][T29611] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 841.801108][T29611] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 841.809074][T29611] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f959e2f56d4 04:51:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 841.809082][T29611] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 841.842980][T29661] CPU: 1 PID: 29661 Comm: syz-executor.3 Not tainted 5.3.0-rc1-next-20190726 #53 [ 841.852113][T29661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.862164][T29661] Call Trace: [ 841.865503][T29661] dump_stack+0x172/0x1f0 [ 841.869845][T29661] should_fail.cold+0xa/0x15 [ 841.874446][T29661] ? fault_create_debugfs_attr+0x180/0x180 [ 841.880260][T29661] ? ___might_sleep+0x163/0x280 [ 841.885131][T29661] __should_failslab+0x121/0x190 [ 841.890074][T29661] should_failslab+0x9/0x14 [ 841.894578][T29661] __kmalloc+0x2e0/0x770 [ 841.898826][T29661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.905069][T29661] ? d_absolute_path+0x11b/0x170 [ 841.910020][T29661] ? __d_path+0x140/0x140 [ 841.914351][T29661] ? tomoyo_encode2.part.0+0xf5/0x400 [ 841.919726][T29661] tomoyo_encode2.part.0+0xf5/0x400 [ 841.924931][T29661] tomoyo_encode+0x2b/0x50 [ 841.929361][T29661] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 841.935003][T29661] tomoyo_path_number_perm+0x1dd/0x520 [ 841.940466][T29661] ? tomoyo_path_number_perm+0x193/0x520 [ 841.946110][T29661] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 841.951915][T29661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.951936][T29661] ? __kasan_check_read+0x11/0x20 [ 841.951959][T29661] ? __fget+0x384/0x560 [ 841.951976][T29661] ? ksys_dup3+0x3e0/0x3e0 [ 841.951997][T29661] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 841.971798][T29661] ? fput_many+0x12c/0x1a0 [ 841.971816][T29661] tomoyo_file_ioctl+0x23/0x30 [ 841.971832][T29661] security_file_ioctl+0x77/0xc0 04:51:34 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:34 executing program 4 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 841.971847][T29661] ksys_ioctl+0x57/0xd0 [ 841.971861][T29661] __x64_sys_ioctl+0x73/0xb0 [ 841.971878][T29661] do_syscall_64+0xfa/0x760 [ 841.971901][T29661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.982537][T29661] RIP: 0033:0x459829 [ 841.992196][T29661] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.992203][T29661] RSP: 002b:00007f47ea62ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 841.992215][T29661] RAX: ffffffffffffffda RBX: 00007f47ea62ec90 RCX: 0000000000459829 [ 841.992222][T29661] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 841.992228][T29661] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 841.992235][T29661] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f47ea62f6d4 [ 841.992242][T29661] R13: 00000000004c456a R14: 00000000004d8750 R15: 0000000000000005 [ 842.015292][T29661] ERROR: Out of memory at tomoyo_realpath_from_path. [ 842.088820][T29856] FAULT_INJECTION: forcing a failure. [ 842.088820][T29856] name failslab, interval 1, probability 0, space 0, times 0 [ 842.115800][T29856] CPU: 1 PID: 29856 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 842.124929][T29856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.134988][T29856] Call Trace: [ 842.135012][T29856] dump_stack+0x172/0x1f0 [ 842.135035][T29856] should_fail.cold+0xa/0x15 [ 842.142634][T29856] ? __kasan_check_read+0x11/0x20 [ 842.152217][T29856] ? fault_create_debugfs_attr+0x180/0x180 [ 842.158021][T29856] ? page_to_nid.part.0+0x20/0x20 [ 842.158038][T29856] ? ___might_sleep+0x163/0x280 [ 842.158059][T29856] __should_failslab+0x121/0x190 [ 842.172824][T29856] should_failslab+0x9/0x14 [ 842.172838][T29856] kmem_cache_alloc+0x2aa/0x710 [ 842.172853][T29856] ? rwlock_bug.part.0+0x90/0x90 [ 842.172868][T29856] ? __d_instantiate+0x82/0x470 [ 842.172890][T29856] ? lock_downgrade+0x920/0x920 [ 842.196815][T29856] __alloc_file+0x27/0x340 [ 842.201243][T29856] alloc_empty_file+0x72/0x170 [ 842.206017][T29856] alloc_file+0x5e/0x4d0 [ 842.210269][T29856] alloc_file_pseudo+0x189/0x280 [ 842.215217][T29856] ? alloc_file+0x4d0/0x4d0 [ 842.219725][T29856] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 842.225974][T29856] __shmem_file_setup.part.0+0x108/0x2b0 [ 842.225992][T29856] shmem_file_setup+0x66/0x90 [ 842.226015][T29856] __x64_sys_memfd_create+0x2a2/0x470 [ 842.241666][T29856] ? memfd_fcntl+0x1580/0x1580 [ 842.246438][T29856] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 842.252509][T29856] ? trace_hardirqs_off_caller+0x65/0x230 [ 842.258229][T29856] ? trace_hardirqs_on+0x67/0x240 [ 842.263262][T29856] do_syscall_64+0xfa/0x760 [ 842.263281][T29856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.263292][T29856] RIP: 0033:0x459829 [ 842.263307][T29856] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 842.263314][T29856] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 842.273691][T29856] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 842.273699][T29856] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 842.273707][T29856] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 842.273716][T29856] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f959e2f56d4 [ 842.273723][T29856] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x24, 0x800) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7f, 0x80100) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000080)=""/76, 0x2000, 0x800, 0x7}, 0x18) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 04:51:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x2, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:34 executing program 4 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:34 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040200]}}, 0x1c, 0x0}], 0x1, 0x0) [ 842.370942][T29661] input: syz0 as /devices/virtual/input/input869 04:51:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:34 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c, 0x0}], 0x1, 0x0) [ 842.499271][T29876] FAULT_INJECTION: forcing a failure. [ 842.499271][T29876] name failslab, interval 1, probability 0, space 0, times 0 [ 842.584912][T29876] CPU: 0 PID: 29876 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 842.594054][T29876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.604105][T29876] Call Trace: [ 842.607436][T29876] dump_stack+0x172/0x1f0 [ 842.611786][T29876] should_fail.cold+0xa/0x15 [ 842.616388][T29876] ? fault_create_debugfs_attr+0x180/0x180 [ 842.622199][T29876] ? page_to_nid.part.0+0x20/0x20 [ 842.627234][T29876] ? ___might_sleep+0x163/0x280 [ 842.632099][T29876] __should_failslab+0x121/0x190 [ 842.637042][T29876] should_failslab+0x9/0x14 [ 842.641543][T29876] kmem_cache_alloc+0x2aa/0x710 [ 842.646400][T29876] ? memcg_kmem_put_cache+0x3e/0x50 [ 842.651602][T29876] ? kmem_cache_alloc+0x314/0x710 [ 842.656632][T29876] security_file_alloc+0x39/0x170 [ 842.661664][T29876] __alloc_file+0xde/0x340 [ 842.666117][T29876] alloc_empty_file+0x72/0x170 [ 842.671079][T29876] alloc_file+0x5e/0x4d0 [ 842.675327][T29876] alloc_file_pseudo+0x189/0x280 [ 842.680274][T29876] ? alloc_file+0x4d0/0x4d0 [ 842.684783][T29876] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 842.691034][T29876] __shmem_file_setup.part.0+0x108/0x2b0 [ 842.696670][T29876] shmem_file_setup+0x66/0x90 [ 842.701350][T29876] __x64_sys_memfd_create+0x2a2/0x470 [ 842.706732][T29876] ? memfd_fcntl+0x1580/0x1580 [ 842.711498][T29876] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 842.717564][T29876] ? trace_hardirqs_off_caller+0x65/0x230 [ 842.723288][T29876] ? trace_hardirqs_on+0x67/0x240 [ 842.728318][T29876] do_syscall_64+0xfa/0x760 [ 842.732833][T29876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.738735][T29876] RIP: 0033:0x459829 [ 842.742635][T29876] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 842.762254][T29876] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 842.770680][T29876] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 04:51:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x7, 0x4000000088001) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:34 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8050000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 842.778657][T29876] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 842.786634][T29876] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 842.794602][T29876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f959e2f56d4 [ 842.802572][T29876] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 842.830774][T30029] input: syz0 as /devices/virtual/input/input870 04:51:35 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:35 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000100)={r1, 0x5b, 0x8c}, &(0x7f0000000340)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613232342d6176780000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003b4cfd6e07bc63f69dca858e7e5610b74589baf6a0756e098d7a7ad7c419c500f545de6100de2fc3177ffe3086e71ec94bd4bfbc9953edf3e4c11130717767ece952f79359a50fe0e36ac385079273bc4ba79566"], &(0x7f00000001c0)="f7c15ecbeaf7d7b9704e2838856e6a43ad0050eebee19142cab75640efb286df448faf32d0e6d58ce860e14f85f264e066bf40ae059bf12bc4a9d0785a9b73724e668de2a2222e5140778adb9ba92f3d4747077d1fb9730fab9f29", &(0x7f0000000240)=""/140) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x2) 04:51:35 executing program 4 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:35 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:35 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x801e, 0x80) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) [ 843.129930][T30307] FAULT_INJECTION: forcing a failure. [ 843.129930][T30307] name failslab, interval 1, probability 0, space 0, times 0 [ 843.214829][T30307] CPU: 0 PID: 30307 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 843.223986][T30307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.234034][T30307] Call Trace: [ 843.237342][T30307] dump_stack+0x172/0x1f0 [ 843.241696][T30307] should_fail.cold+0xa/0x15 [ 843.246307][T30307] ? fault_create_debugfs_attr+0x180/0x180 [ 843.252130][T30307] ? page_to_nid.part.0+0x20/0x20 [ 843.257177][T30307] ? ___might_sleep+0x163/0x280 [ 843.262053][T30307] __should_failslab+0x121/0x190 [ 843.267006][T30307] should_failslab+0x9/0x14 [ 843.271535][T30307] kmem_cache_alloc+0x2aa/0x710 [ 843.279351][T30307] ? memcg_kmem_put_cache+0x3e/0x50 [ 843.284559][T30307] ? kmem_cache_alloc+0x314/0x710 [ 843.289596][T30307] security_file_alloc+0x39/0x170 [ 843.294631][T30307] __alloc_file+0xde/0x340 [ 843.299059][T30307] alloc_empty_file+0x72/0x170 [ 843.303831][T30307] alloc_file+0x5e/0x4d0 [ 843.308083][T30307] alloc_file_pseudo+0x189/0x280 [ 843.313022][T30307] ? alloc_file+0x4d0/0x4d0 [ 843.317530][T30307] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 843.323795][T30307] __shmem_file_setup.part.0+0x108/0x2b0 [ 843.323813][T30307] shmem_file_setup+0x66/0x90 [ 843.323836][T30307] __x64_sys_memfd_create+0x2a2/0x470 [ 843.334116][T30307] ? memfd_fcntl+0x1580/0x1580 [ 843.334133][T30307] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 843.334146][T30307] ? trace_hardirqs_off_caller+0x65/0x230 [ 843.334158][T30307] ? trace_hardirqs_on+0x67/0x240 [ 843.334180][T30307] do_syscall_64+0xfa/0x760 04:51:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x5, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x10) [ 843.344279][T30307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.344290][T30307] RIP: 0033:0x459829 [ 843.344305][T30307] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.344320][T30307] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 843.356079][T30307] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 04:51:35 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000040)={0x54, 0x5, 0x2}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:35 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 843.356088][T30307] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 843.356096][T30307] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 843.356104][T30307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f959e2f56d4 [ 843.356119][T30307] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:35 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4c00) 04:51:35 executing program 4 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:35 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x6, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x260000, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @remote}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={r2, 0x0, 0x30, 0x1f, 0x101}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200), 0x4) accept4$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14, 0x80000) getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@rand_addr="c86b63792c8a7053edde66d0031bf4df", 0x4e24, 0x8001, 0x4e20, 0xfffffffffffff800, 0x2, 0x0, 0x20, 0x36, r3, r4}, {0xffe00000000000, 0xf8c5, 0xfffffffffffffffd, 0x1, 0x800, 0xff, 0x80000001, 0x3}, {0x1, 0x4, 0x2}, 0x2, 0x0, 0x3, 0x0, 0x1}, {{@in6=@empty, 0x4d5, 0x7f}, 0xa, @in6=@mcast1, 0x0, 0x6, 0x3, 0xffffffffffff0001, 0x7014, 0x7, 0xffffffff}}, 0xe8) ioctl$RTC_VL_CLR(r1, 0x7014) [ 843.764503][T30673] FAULT_INJECTION: forcing a failure. [ 843.764503][T30673] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 843.777739][T30673] CPU: 1 PID: 30673 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 843.777754][T30673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.777760][T30673] Call Trace: [ 843.777790][T30673] dump_stack+0x172/0x1f0 [ 843.804535][T30673] should_fail.cold+0xa/0x15 [ 843.809136][T30673] ? fault_create_debugfs_attr+0x180/0x180 [ 843.814947][T30673] ? is_bpf_text_address+0xac/0x170 [ 843.820158][T30673] ? __kasan_check_read+0x11/0x20 [ 843.820177][T30673] should_fail_alloc_page+0x50/0x60 [ 843.820198][T30673] __alloc_pages_nodemask+0x1a1/0x900 [ 843.835770][T30673] ? __bpf_address_lookup+0x310/0x310 [ 843.841155][T30673] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 843.846881][T30673] ? __alloc_pages_slowpath+0x2520/0x2520 [ 843.852605][T30673] ? kernel_text_address+0x73/0xf0 [ 843.857724][T30673] ? fault_create_debugfs_attr+0x180/0x180 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 843.863545][T30673] cache_grow_begin+0x90/0xd20 [ 843.868322][T30673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 843.874571][T30673] __kmalloc+0x6b2/0x770 [ 843.878819][T30673] ? mark_held_locks+0xf0/0xf0 [ 843.883584][T30673] ? stack_trace_save+0xac/0xe0 [ 843.888437][T30673] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 843.894163][T30673] tomoyo_realpath_from_path+0xcd/0x7b0 [ 843.899708][T30673] ? tomoyo_path_perm+0x1cb/0x430 [ 843.904737][T30673] tomoyo_path_perm+0x230/0x430 [ 843.909597][T30673] ? tomoyo_path_perm+0x1cb/0x430 [ 843.914622][T30673] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 843.920694][T30673] ? __fget+0x35d/0x560 [ 843.924856][T30673] ? __kasan_check_read+0x11/0x20 [ 843.929883][T30673] ? __kasan_check_read+0x11/0x20 [ 843.934912][T30673] ? __fget+0xa3/0x560 [ 843.938997][T30673] ? lock_acquire+0x190/0x410 [ 843.943675][T30673] ? do_sys_ftruncate+0x282/0x550 [ 843.948721][T30673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.954986][T30673] tomoyo_path_truncate+0x1d/0x30 [ 843.960025][T30673] security_path_truncate+0xf2/0x150 04:51:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x7, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 843.965316][T30673] do_sys_ftruncate+0x3d9/0x550 [ 843.970175][T30673] __x64_sys_ftruncate+0x59/0x80 [ 843.975121][T30673] do_syscall_64+0xfa/0x760 [ 843.979629][T30673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.985525][T30673] RIP: 0033:0x4597f7 [ 843.989421][T30673] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:36 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4c01) [ 844.009031][T30673] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 844.017446][T30673] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 844.025428][T30673] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 844.033405][T30673] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 844.041386][T30673] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 844.049365][T30673] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:36 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5408) 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:36 executing program 4 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:36 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) unshare(0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3ff, 0x4a501) bind$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0xb}}}, 0x24) 04:51:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x540c) 04:51:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x8, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:36 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5421) 04:51:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x49c, 0x280) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000040)) accept4$packet(r1, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b80)=0x14, 0x80000) sendmmsg(r1, &(0x7f0000001dc0)=[{{&(0x7f0000000100)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x10000}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)="c99f1f5c644d398dcc72815605672eaf0645488ea9d845a05a30e4c71ff7e59b615f23aa53b191f0c520159612f149e365b225ec866bf81f297171f896243fabe00db38f287bc3b5e86fd4fb80eb482fd789a7ffed5d484d2da8f6f916a5173573116e6a5ec12b97cc64093a80fed14801d9b6f70cc16351ce78ef3853410e46c6f8ac7847e3060125aa8c2f10ac11a9e1a24481f0997b8ab622542d67c41d2035e55b87bf639760e14ad3fbf0a144f45ada52a78ca7720066627838379ad21bd928cff183aaf7d8a3b1c080d177dd9fd3f6092382814dc1f6befa", 0xdb}, {&(0x7f0000000080)="7a485efdedeba14e5e6c42ef49bbe08da237", 0x12}, {&(0x7f0000000340)="4a337a673a73861121a62335ffe606f769c63216354fd4c76946136b4a0b00a2796561a638d2fcf5d65bafd7ff74c0ee8cb7b4ce4f54715223e9e61059e0e7a087a032a81b41d7d969aeae26af297f597f193bec28986dbef87bdc77e16ddf064e3a1d5521ff3370fdd47ee105a51d0dbe953b53d3e405f85d35ade41f6fb6f691e182cd9f40164c9ada3195967b340f428cb0a7555f20dfd351c1135fbe11d803b34a84c7d09801328bb13ebf36e5a795325b48a6928901ac8a131d3f298b1a1baefa8243695ff27ff78fe398add026c3a797e453296bb7829dec002f5443e0c8a43547365aef4aa43ee616da5f8e71ca2c75b2baf64de9", 0xf8}], 0x3, &(0x7f0000000440)=[{0x80, 0x107, 0x5, "59d431f22e8a6101df4b8cf03967f43c56f8cbfbaa77f151e7852a72f54ce133fe8a6b2c12bd75937375c8b120aa3278c5370d71578c6238769451fa950066a5e323545d341ea40017c0092ff21c088906917b3b8a501eef8c303da9e1bdb0b3f25fa425c6caa4b74081"}, {0x98, 0x0, 0x7, "897664022ee74bedacb697dadcae03c9cd18551b49467f93614943737392bf56ad5f8c2415fb48a02096ae84cfd0c6d01976f8906df36d72a0007e76ff6d36a493821dd4e01548dee594f27aa9754f89831851a148905097f579dcda914fa77399737dc9d7e57163c733840be8b2cb18a30ac3ac32c72800bb27abaa376de1e71f"}], 0x118}}, {{&(0x7f0000000580)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000600)="234ba4a82de3cfcf565cba9d347de1d9f4a3b9700433454a0d2b0f541cf59f44bad7af4becfd899a1467697eec33a1f8f46e8432eb006906aa9774813c9be45fd3e7d26c103ec2c1dc159fb853626d8342fd8da39de1ad861dd69227a77014d3e503c7260e6bda36efc2402306a1cc41ab7d1e8958e5253c02a2a73a7a636a6629311f56ecb6ff65742a2d1f1b027beb8eb56999bf5b0db2d33e7aa2203ad19aac683e85c994536f72dbd373c0db1ed497", 0xb1}, {&(0x7f00000006c0)="a16701ffda8533569c7acf464e8d7b48e6b9c536c1b8474629d6fca979d266f40e74a4135f531981a654e42c6048d3abecf4ccd70cf1d800046f7130710705e319ab0c8e0fc6de243941bdac4e93f3def70563b3799cb37c49b11eaaf48caa96272572b367032ce061db14c52d1d0e70f3a11f457a616eef1dc02be77a14c7faef2ae4a07573f5db4819a954b2ebbc6d0407525c827d13d945565f4eb8a719c59b9aa0c3a127a2", 0xa7}], 0x2, &(0x7f0000000780)=[{0xe8, 0x115, 0x2, "ff6da300051df45247d2706ff338cbe06ea9648bf243b1d34507e38b8fe0e4475eb296f4a2d07aca104a4d867d8a0b5bff7c34335c12380a05f22031a423107afc3f037c2484ddeb858d0b0d634c94390baff3670ede5b4ec9f72b812a1d066a2fe62673df0d3454acf4515649613bd50e7c404ca88f6d4a703c392813539a98b90ea7f33a1754d8b3fd2718ec22e58539cb7963790183e5719ea8ac9965377feda458a5c3b82bbc67219d1c77f648a6ab44c934a9f6268bb0f99c004409a5ee4a98d967f414e5e6fd78f836b17ab64e510da2"}, {0x1010, 0x11d, 0x7, "3f7a7498f217043dacc0a9bd8f3637bd9a41c584e3ac16fd6c08829a5c5047a86a69f61f5bc5d60ed4954b4d93abcdbc935fe02b7df81dfabc380c1e82bb5bf1c266f5d513e27825e4a9c8b48b15768f4aebf2f52718313eb4d99df81db996bc4ccd37151ced87bf80bb4d037fc4ce86d19698d2d22b249498b1d08955321bcf26ca28cef0176eafab9dfa4716b5d90f43426dd28e60ed43789b7edd14a7430060a14938aa5f67aa0b58d825a5d2e76f614d6bf8894a1474e9ef851c3bace2817554f8149eed23541f587d713f504e0166365973d8ae423e88720af49de50331bb7f68638b0f5d80f2d005825f900eb8aeb84d9eb15a0e48f81247454ba423a6478e5a43e5a2669989fadc6a5a3e159161ce893b77165045fb580e3db16d2d3c214ebb623760f6c81b16fd0f44f3776c1b1dd1fa4c3c26b2239ac2695b039e6fdbd9da42996d15dd25a3b321e57caa85d662db69caee2b91cf385cb370f8197ee2a66d7009005e879d03924512e255315c0f6f5fb7addf43162a9688cc0812e459d1043bd3d74818e6e08341f8496be6b094748d5ae25a1f83f1a5ded2a595be56a2f503c73130680d88e5cb6492324f5b601e7d6c06729fb5114af9564af6f8e95e8c6f74aecef15f6e7d91299ff876ba8104ec7cadcb7fa3e94fa9f36a6d556b961d7fe6b8bb769334675c4be6463f06cafba8af349fcaca630c3eab73e4a95067c7f591ec726221ac0f6e5e38c6082c8059d4a65fa4ea7ffb998517f3a44d104f73e1e13bcf7c02627aac59286476e3cc928496e1561c54cc109a0f89fc1c5b66b6aa6240500c992012baa00d7e55bd2de67ca4c485df4888f70e1dcbd2ea004afbcd80cf2cd75179f6ebe9a8b6b4c0a82a511c1ffdca901f9dee955a8bbf9a532fca248ebbb4d8617829349ac4a5443afc8233f1d20551f3fe06fc533a2d4ca66a8770d2083fc84ca530f34835dfa949981d1cf86fe542aa810285fa4f7e1c93753b6bf4c6f25b0314c9bd25d0c88e81315e9b994267a330f7d2c4446f1f40e34ff403ea5d771d9d30655ecd79b198d869ace0d4fb341111127c048ee6a7e04f02a50817dfab23a288b21193e246f6bc605040a6605b52a7c84a1a40b93c5d2495f8c1c9b3c342fc6cd8d565f40a8469c24b90237957ef0d5717925d591ff54b301e94f46149ec594f6f2a1e41aad5a80467057088491ee0665e5fc3b4c5e41870cc1f0b5e0ed925f3524d325d34b9898672e4d115283060b6a75917e5d7027b0a62b112e719e18d2ee2e20dc6a7dd6c4d7b074b40de4e9acbd42dd2099f7e1e7c96f048cef8a80414e483a7d9108f281034769b63d77725ff16290dc7188516b9a11d7a800ce8d4f094e5da2bac8e8bf22de84a37dc1df18ce1d2cf092a9993bc0536e4b129472771f01b2f2b20b3b571a9d75d0ae168c27b030bf48bd0548ddc30dd113c08bcf6dd760e36de4207ffcd6fac7ab795bc6e9cdffc078bcca5822cd4ff0e97c0cacf38f1ea13b774bd611012a58d4956ac91a6604343bb60a1a1e9a8034c990c8c5669a2fed99c60e9f0f4e05334bf2bacf998fae30fc792129c9e965377d2a9f52e4ec49725cce1463dec162bc3f6dd0972aa0a45f1806d832c6b67adb34d178aaa0c10d0bd8dc9a49500a043082f3ce5f1283e6bde29220d9316afbb5757d9ff60556be2ab28c7cc659a215b75271780a01331b05591d95b8bf59004a373b5506d11e8bedfc287c1b067d6c11b45102b86c385ee709ac6ffbe5617bba4ff0f3e951bc07b96744d649616eff608e9031c462d6e43565d78c61d3ce17cdf9dd32d0ef26f4c41d4341aecaaf9284cf67eb33ef963715eb5fad57c3a3863726d1399d0385904cdcf1a4ed6e1c86d41763bf1c2a2fd365932f8570c5614fd020466f4ddf7042dbdf553390a4ec97dfe80ab1e9ed26e31e4807dafec96fcf833dfe2ce35aba98dc656bd4f72edde3cb4d22450bd79690550612906db36aee0df8638da764b80703afb04d74578fb8b270a3c24e1c19f6d2add8314d5b39495a4521c953461525cad89ffca12fb1b1f44a176b965bfb42e97710cdf3d31ba2db984013d73f260640d894b63e2fdd96219cba31606156affa4b7c402cb1219e9a935279e5a68a592b51878324d395d63fc834daa096948938535f36be02c0638c5009207312ab0151d67eda1d652b37ddfb714f82c241c7d135a5a4bd38dc874a858df53a3d2de3d9c0a4386c8aa23839b4f8a0525b20a290ef769ae0adc17ac1f6bbd6263b2be2c6279e5adc8b62d7207e46d2870e003f9b88d49e0163b2bdaba073ca2fc15e1a50f26877c7d5b4276b0c89b516a15a7b01892fb407b47ecedd4749df489af637cbcc41e8b17eedc3b293633ca81d68ec32b9b9da5c0ee7c47243496938e84bf780a8ac67409b607c854cfff152d2f4562243f9b9b69a84f93f2ee96a4082a56dafa78b74acc535d7d23978d74e77e3851e47b0c77cf4aab8cb031564d2316e5288d6d5b5a026c562118e51b19c699d383bcd7260c49fcf5b5bad583aeff744cf4bb4c02580602887c60dd80321a63db06a7f7c37896675756f09507820915e3fc3f9a1b0ab2a94fe4b9b984651629c04fd8630a02dde066c882aa8e2020e52da09e5c5b00c4fad31f962288038fd1f61489db4003e9aa320d0fda117b1bdf2d44cdeda8358b0f6378d039ba7b9b5f863f5a0afc04b7b5beb5e4c3616c89c41a748033e0d22243b52e640f665f9686e6bcafb41c2be22bebdf40902a11c185034bb87ed4a7f4896b7ac7d0523465fdb5a4f8873ab30a05ae3aa7379d34c0d6bc0bb9e18e0e8948e40466173f541d712fa73b247e93807a343c045b7203c068ee724ce95251f0cad5d397ed56370fc2840f051082310d9701fa73347a507a19f5810dbba23807651c3a56318fe86db4a3e365c82c3f8ac02f4200621af4247ac8e88ff25ba67670ca702294ab0e97741588b3049ce61dcc93f819e057dfcdbbbc75675095573c3a43624bcf54978a6979b2d691c83c2ccb33981f282ab92e40e7147c767c17569d2712c423d23da0385d409e27387bc353830cd1b08c5e4d799d224a9e90c4aeda3959056ec8871e94ed286ceae1ebaf39f0d4992171c91254b349369561e4e20f9df2c3aeb99af2c47ebcd9015febe22064258204724f4947a2c4cb7f04b70e4d7c5f024388084a6887d59eb5220a557536b879030cc90481eeec6b5aaf95815cb65e733825f3da4e2b190dea8e12406c11fa072d80e5bbcf3a8e9acc858be7145f56ca7249a87fc07c19c0a9570be057f80f28edd69812c38e9d5b1d12f893e83d52d98dd602725ccbad649c6a2af121fd7aa278e1ce257d9ca3f50f5e9f5373edabde35fa1e78a13f784d8e5ddf5431f0fe38cf7d540cd65d34ffd8eace3eb5479475a05a451c09468f0b40ef137fadf418a7cca6dc5383349cdab931eb2512383dc55515a2880ec9758554a06ea514a3bc04938ee96c4b348b84c7eaa5e6825986f72225019a09693d2477984b8e141daccdd429d57a1f094ba98137eafa4698355e3d7f0eaed087fdcec784bb6dcd02602264af12cc64dd08087f88444e0ba49ac8df63a24fea3d9da1878691c16c3bf6ee9d49e779de9ae498e292839cabe7d9ca5a62e6e271733215d47f8f90964e078d67a70a7f3ccb35fb4fb7e054c55b5e266841f309426bc9c2dab09373c72542ae4c91966a61cf1896b6ee5bf4c6f49567f8aff190a98da2b378406c36546d61e0598574376d224c34efc66544706c472fc8b7eb08afb9c3fd2c18758f6ef747f690957fc0e4f2d58167e66584491e16ac53da3e50680ce7a177a04fb7b80b521e1c34e35e448430c61babdca8e877ef8b592a1952e6fe0b1d4c041770191b79ae22db5341821de6b4a18eefe9b526e1d0a012ca0dd75fa773e2fdfa3e7e526ae5eb9bcd884bf2d19c5f8c3296a62707cfebebcda6b98d49f3e96b377e3ee03ebc39a875f703337432036c68a15e5fffa4a8383bacf89a74e6f7cd75a301d169dd3da9ac2d84353fb21a8b8edd0df5514a166ff17307126aeb1e590d568a7ed46132314575f82fd624717031f02926987ad4406ce5967bdd0325c92ec706c1fcc3e8dd6bc0ca38276f3903288196ab37d42a010535b487e3f68bfba7bc3d8095340660caaf974d15e00f24ab5dcdc1d1d5cd9208dc8c915672ec91d78782c3c08e8e2100bbed0b01f70017f3c2a564e987183bad849dbdd1be23fa000e99e6b0be09ae36efb01afee3081b43ccb8ad911a0968f85d87112926a3b50d9cddceceae767c654d42743a61a5cd230d76bc17bffa8d24db51c078263ccd314739622c9b5dd55819db451111de8f51b9d8c5d760e13a437e614058ebcb4ffb7cbe0b2cd3ce7eb35ab54444f61ee1c8bb3b362fa75d4b577cb582040636d5f95be06d18b6fa283b5650101aea7363a818fa2546b3c5d58130b296d05eaa03319e2c201536c3bbb94a807a13c095a866d9afe08c5625cebfdc34fd4efbefc894bfd09d389f7b34814201ea8332ae6b4f6c179ba7fd76f96a0d1a610ff091a39873830f6f1d6763fc69aba5280c6047869e7b172bb93e7fb2aa4990bf79386c4d48300644420d8d731aa7eaf1c085883f717be0167875f4b7e6a873172afb7eaab1c400a421af8828dd4f5d93900c083a56baf37a2188b4cdce5a2a16b201f485db19c8da34f4ddec6860828794d2197619bf28ee85c576283e18e6625e15f5006bd55173fa3b357bc59c47f4fa7aba38b1a3a0dbcce6988b8bba5db726f31820470da51b1b432bd3a26f871e6492696ca082e83c04a2c8cff5e399030455aae2e6f838e1805c3acd846427c8d4cb13a590fd2bc4bd6eff68b2e4f4610a8d0a4b67aa18bec9ffd2fc441274b068877da6a1b421e84e0f6da788546bd5a18cbbc1daebecfdd92ebc6f623cf1858160c293c1991b8a435ed44992e489a84dd68e0f8c5f78da1396aa407de27000f87d60ede3f367da6e4413c227a28ae17dbb2c457cf110151cd840a34e33be54274fa7db777295d671b3b865b46ea5cf8021e490bc1a7b8208438970bbda5b2116c9f4b62a400350f36fa1628a253141aa8ed22810006fe6f833fc66d85916ca6b7a58c2b819666c7c62349203d7c56d98b08757157f724e52494ce6cefff5be5cf416269603256516a867072563e8ad5b31c4b0a503ae839adafae1ab3af5abe293a664baabd099c2ba9fb92ec4bc139423c68f649c2aff933b225a1ef629eb7fec56c5879ddac01b15574fb1c7167ae63e80d9860fcdd8e2774bc3f8996f55480534d4bcff31a0c2afafec22f80d4f30849261c0e1ae514dff181ec90df8493df53c67be6debce00e15687757b316cefc1121fbd812b0756a2c655c31125bd8fe90b995d18980d8b16434dbeaf43aee5cae71a5e87e2b33ed5b022115a97b22fc8a7820cd44534c188f633b94c9ad55982173ce63184465d80e2bc097417f2c633ce43a3f017e75cedebe20f4c7141c6e9240986b9bd881c058b11e2606a557aa1eade1109f993d707161b40f815a7c05079f2405fde5a5af494cf67a7ea7c8074a8de70cef13448110239fa919d54c0d79311390c1fcbd5f836655576b9b78d4f5b78330478f6e52bc7ad147bae4fdf980c9ed32db9f50346e9fabe39e57b0d50aa215c6e4bd27aaa4640a7929d73aaf2e71bcdf5e0b1fcfd7c345049c1e11b4329235feca66cc04d68ca03be6e02d74840a412d72bb5cdd2de9b99e92b99f46d68b4d4df697a16c34a4ea92fe6c7494aab"}, {0xc0, 0x115, 0x4, "35c40fa85ea8b47a112611121e42079a02e489bed734e284ae58cb6bc873162a4c9353ba6ffa2f4e0bf28a70430a5f945594adf3784b35b30534c09c913916cda199906dc59c7c1c8f2f3bd46a3f808830ea775f31a7f98c8b02d76178d2f59c192c71b507a43243afd1c9fc561ef598e8950b529db8dedfb5ea684577db93115c08ce189a4c2aa0789c2d098b393c1be3516715a670f7a553ca40311295ac0a3a0a44f6bfa3a2f993d09e6a4d0e5e"}, {0xf8, 0x114, 0x0, "ac758cf17a9c3d7f075157a1c79e8ea36c9bb6abf80d5c5604e2d38ebf89eb39a8e2a786c12caaeeef2e0ec742ed9746ca25229062b06412d77546eec3a2b74cf1618743e819842fcc7e1f67e4b6e9d821ec34a79e97ff6549a1091f8963cb5f262931e84fffe340d9c62596a1ce52ae3a21f33eef47973c5566da2d7b5b55629550c6071b8452e57db98cd563cdc1914a03ea4fe9597c8663788823245ecfce04ebf67b9a173b60b31ee23d7b3fc14c8acd94321e907273ae88f1edd5b7890d52acb960930c8aaec8d99640a9f6c712d753288628045222f1f3222105e82895a1b81a6d9aa6"}, {0x68, 0x102, 0xfffffffffffff001, "4c538dc2b2fa5bbde8ff038153eec43339b5b5482367b555af711e163f3af7afae868318f0fd579b6390aee669639ba2000c21b1c5eaa55f5a07923780d165708fbc026f7c8986fccce1f5fbe39a8db41fe1c9482c7162"}, {0x48, 0x84, 0x1, "a12ed5858c2f21b399ec5cc468e5d59e2085f160781aa973c4690b30d08bac8ef334a7be01ba89196a386dcc83208119bd8c271ae08ca9bd"}], 0x1360}}, {{&(0x7f0000001bc0)=@hci={0x1f, r2, 0x1}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001c40)="2efd169dfbc41e8a53c4c129978cb85241ab5d6a24c52d1e83213ce1aa147e96b718f5", 0x23}, {&(0x7f0000001c80)="a14024cbf4af2a88ae688c3e54c99de38fb6909e3d951764690cf89af5cb91e7be23f9ed4405f3118d4a2942efa7ee23b062621b42b2521d", 0x38}], 0x2, &(0x7f0000001d00)=[{0xa0, 0x3a, 0x2, "51d300a7806f8b4298df20bf16f2e78e302682966c26dc3c2705032dff4bd051ace602c00377063cc63c7ac07f469f6fdb88cc8105dbc27d88b089d84363d1bbad4ff521a6832a1cca120594817855618beb68d4818c4919934eb67dfc7c0184f2f769796e5414b56151acf1e897e1ac2505134e45a3a9203d8c2cb802f0acdd51c331c7cdad238889bb32181a4f"}], 0xa0}}], 0x3, 0x20000000) [ 844.513311][T31145] FAULT_INJECTION: forcing a failure. [ 844.513311][T31145] name failslab, interval 1, probability 0, space 0, times 0 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x300, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 844.652347][T31145] CPU: 0 PID: 31145 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 844.661493][T31145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.672336][T31145] Call Trace: [ 844.675644][T31145] dump_stack+0x172/0x1f0 [ 844.679997][T31145] should_fail.cold+0xa/0x15 [ 844.684602][T31145] ? __kasan_check_read+0x11/0x20 [ 844.689637][T31145] ? fault_create_debugfs_attr+0x180/0x180 [ 844.695450][T31145] ? __kasan_check_write+0x14/0x20 [ 844.700570][T31145] ? lock_downgrade+0x920/0x920 [ 844.705429][T31145] ? ___might_sleep+0x163/0x280 [ 844.710296][T31145] __should_failslab+0x121/0x190 [ 844.715254][T31145] should_failslab+0x9/0x14 [ 844.719759][T31145] __kmalloc+0x2e0/0x770 [ 844.724010][T31145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.730263][T31145] ? simple_dname+0xd1/0x1f0 [ 844.734863][T31145] ? tomoyo_encode2.part.0+0xf5/0x400 [ 844.740240][T31145] tomoyo_encode2.part.0+0xf5/0x400 [ 844.745448][T31145] tomoyo_encode+0x2b/0x50 [ 844.749872][T31145] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 844.755507][T31145] ? tomoyo_path_perm+0x1cb/0x430 [ 844.760548][T31145] tomoyo_path_perm+0x230/0x430 [ 844.765400][T31145] ? tomoyo_path_perm+0x1cb/0x430 [ 844.770429][T31145] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 844.776499][T31145] ? __fget+0x35d/0x560 [ 844.780654][T31145] ? __kasan_check_read+0x11/0x20 [ 844.785681][T31145] ? __kasan_check_read+0x11/0x20 [ 844.790709][T31145] ? __fget+0xa3/0x560 [ 844.794791][T31145] ? lock_acquire+0x190/0x410 [ 844.799475][T31145] ? do_sys_ftruncate+0x282/0x550 [ 844.804509][T31145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.810768][T31145] tomoyo_path_truncate+0x1d/0x30 [ 844.815802][T31145] security_path_truncate+0xf2/0x150 [ 844.821090][T31145] do_sys_ftruncate+0x3d9/0x550 [ 844.825950][T31145] __x64_sys_ftruncate+0x59/0x80 [ 844.830889][T31145] do_syscall_64+0xfa/0x760 [ 844.835409][T31145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.841302][T31145] RIP: 0033:0x4597f7 [ 844.845200][T31145] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 844.865028][T31145] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 844.873442][T31145] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 844.881411][T31145] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 844.889389][T31145] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 04:51:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0xfffffffffffffffe, @remote, 0x1}, {0xa, 0x4e22, 0x3f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffffffff004b}, 0x2, [0xfffffffffffffffe, 0x80, 0x6, 0x6e9, 0xfffffffffffffffd, 0x4f, 0xffffffffffffffe0, 0x7]}, 0x5c) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) [ 844.897360][T31145] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 844.905336][T31145] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 844.919149][T31145] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:37 executing program 4 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5450) 04:51:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:37 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5451) 04:51:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x101, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0xc0000, 0x0) 04:51:37 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x500, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 845.191817][T31582] FAULT_INJECTION: forcing a failure. [ 845.191817][T31582] name failslab, interval 1, probability 0, space 0, times 0 04:51:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 845.259300][T31582] CPU: 1 PID: 31582 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 845.268454][T31582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.278510][T31582] Call Trace: [ 845.278537][T31582] dump_stack+0x172/0x1f0 [ 845.278561][T31582] should_fail.cold+0xa/0x15 [ 845.278580][T31582] ? is_bpf_text_address+0xd3/0x170 [ 845.278605][T31582] ? fault_create_debugfs_attr+0x180/0x180 [ 845.295960][T31582] ? page_to_nid.part.0+0x20/0x20 04:51:37 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c, 0x0}], 0x1, 0x0) [ 845.295978][T31582] ? ___might_sleep+0x163/0x280 [ 845.296000][T31582] __should_failslab+0x121/0x190 [ 845.316554][T31582] should_failslab+0x9/0x14 [ 845.321062][T31582] kmem_cache_alloc+0x2aa/0x710 [ 845.325916][T31582] ? stack_trace_save+0xac/0xe0 [ 845.330787][T31582] ? stack_trace_consume_entry+0x190/0x190 [ 845.336597][T31582] __alloc_file+0x27/0x340 [ 845.336614][T31582] alloc_empty_file+0x72/0x170 [ 845.336635][T31582] path_openat+0xef/0x4630 [ 845.350189][T31582] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 845.356001][T31582] ? kasan_slab_alloc+0xf/0x20 [ 845.360770][T31582] ? kmem_cache_alloc+0x121/0x710 [ 845.365796][T31582] ? getname_flags+0xd6/0x5b0 [ 845.370473][T31582] ? getname+0x1a/0x20 [ 845.374539][T31582] ? do_sys_open+0x2c9/0x5d0 [ 845.374552][T31582] ? __x64_sys_open+0x7e/0xc0 [ 845.374567][T31582] ? do_syscall_64+0xfa/0x760 [ 845.374590][T31582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.394543][T31582] ? lock_downgrade+0x920/0x920 [ 845.399402][T31582] ? current_time+0x6b/0x140 [ 845.399415][T31582] ? __kasan_check_read+0x11/0x20 04:51:37 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x121000, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x8a, @loopback, 0x6}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000400)={r1, @in6={{0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xbfb}}, 0x1, 0x40000000000003, 0x9, 0x5, 0xffffffffffffffff}, &(0x7f0000000080)=0x98) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x200000001e, 0x40000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000300)={0x7}) [ 845.399431][T31582] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 845.399444][T31582] ? shmem_setattr+0x4c7/0xc80 [ 845.399455][T31582] ? __kasan_check_read+0x11/0x20 [ 845.399470][T31582] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 845.399493][T31582] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 845.435528][T31582] do_filp_open+0x1a1/0x280 [ 845.440033][T31582] ? may_open_dev+0x100/0x100 [ 845.444712][T31582] ? lock_downgrade+0x920/0x920 [ 845.444727][T31582] ? rwlock_bug.part.0+0x90/0x90 [ 845.444742][T31582] ? __alloc_fd+0x35/0x620 [ 845.444763][T31582] ? __kasan_check_read+0x11/0x20 [ 845.463925][T31582] ? do_raw_spin_unlock+0x57/0x270 [ 845.469031][T31582] ? _raw_spin_unlock+0x2d/0x50 [ 845.469045][T31582] ? __alloc_fd+0x487/0x620 [ 845.469064][T31582] do_sys_open+0x3fe/0x5d0 [ 845.469082][T31582] ? filp_open+0x80/0x80 [ 845.487043][T31582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 845.493290][T31582] ? fput+0x1b/0x20 [ 845.497104][T31582] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 845.503176][T31582] __x64_sys_open+0x7e/0xc0 [ 845.507687][T31582] do_syscall_64+0xfa/0x760 [ 845.512225][T31582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.518114][T31582] RIP: 0033:0x413711 [ 845.522010][T31582] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 845.541617][T31582] RSP: 002b:00007f959e2f4a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 845.550028][T31582] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 845.557995][T31582] RDX: 00007f959e2f4b0a RSI: 0000000000000002 RDI: 00007f959e2f4b00 [ 845.565965][T31582] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 845.573947][T31582] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 845.581923][T31582] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:37 executing program 4 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5452) 04:51:37 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000, 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x2710}}) fcntl$setstatus(r1, 0x4, 0x800) 04:51:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5460) 04:51:37 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x600, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 845.805490][T31927] FAULT_INJECTION: forcing a failure. [ 845.805490][T31927] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 845.818745][T31927] CPU: 1 PID: 31927 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 845.827873][T31927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.837936][T31927] Call Trace: [ 845.841237][T31927] dump_stack+0x172/0x1f0 [ 845.841270][T31927] should_fail.cold+0xa/0x15 [ 845.850170][T31927] ? fault_create_debugfs_attr+0x180/0x180 [ 845.855983][T31927] ? rwlock_bug.part.0+0x90/0x90 [ 845.860913][T31927] ? current_time+0x6b/0x140 [ 845.860929][T31927] should_fail_alloc_page+0x50/0x60 [ 845.860951][T31927] __alloc_pages_nodemask+0x1a1/0x900 [ 845.876067][T31927] ? __kasan_check_read+0x11/0x20 [ 845.881099][T31927] ? __alloc_pages_slowpath+0x2520/0x2520 [ 845.886815][T31927] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 845.892450][T31927] ? __kasan_check_read+0x11/0x20 [ 845.892472][T31927] ? fault_create_debugfs_attr+0x180/0x180 [ 845.892488][T31927] cache_grow_begin+0x90/0xd20 [ 845.892505][T31927] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 845.892520][T31927] kmem_cache_alloc+0x64e/0x710 [ 845.892535][T31927] ? __kasan_check_write+0x14/0x20 [ 845.892554][T31927] getname_flags+0xd6/0x5b0 [ 845.903368][T31927] getname+0x1a/0x20 [ 845.903390][T31927] do_sys_open+0x2c9/0x5d0 [ 845.903405][T31927] ? filp_open+0x80/0x80 [ 845.903419][T31927] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 845.903434][T31927] ? fput+0x1b/0x20 04:51:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5502) 04:51:38 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 845.903451][T31927] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 845.903470][T31927] __x64_sys_open+0x7e/0xc0 [ 845.914527][T31927] do_syscall_64+0xfa/0x760 [ 845.914545][T31927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.914555][T31927] RIP: 0033:0x413711 [ 845.914570][T31927] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 845.914577][T31927] RSP: 002b:00007f959e2f4a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 04:51:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x700, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 845.914591][T31927] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 845.914599][T31927] RDX: 00007f959e2f4b0a RSI: 0000000000000002 RDI: 00007f959e2f4b00 [ 845.914614][T31927] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 846.028233][T31927] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 846.036214][T31927] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:38 executing program 4 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:38 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5503) 04:51:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x6}) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x589, 0x2) 04:51:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3f00, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:38 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5505) [ 846.405981][T32274] FAULT_INJECTION: forcing a failure. [ 846.405981][T32274] name failslab, interval 1, probability 0, space 0, times 0 [ 846.466926][T32274] CPU: 0 PID: 32274 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 846.476081][T32274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.486149][T32274] Call Trace: [ 846.489461][T32274] dump_stack+0x172/0x1f0 [ 846.493816][T32274] should_fail.cold+0xa/0x15 [ 846.498425][T32274] ? fault_create_debugfs_attr+0x180/0x180 [ 846.504257][T32274] ? page_to_nid.part.0+0x20/0x20 [ 846.509298][T32274] ? ___might_sleep+0x163/0x280 [ 846.514165][T32274] __should_failslab+0x121/0x190 [ 846.519113][T32274] should_failslab+0x9/0x14 [ 846.523626][T32274] kmem_cache_alloc+0x2aa/0x710 [ 846.528487][T32274] ? memcg_kmem_put_cache+0x3e/0x50 [ 846.533690][T32274] ? kmem_cache_alloc+0x314/0x710 [ 846.538726][T32274] security_file_alloc+0x39/0x170 [ 846.543753][T32274] __alloc_file+0xde/0x340 [ 846.548179][T32274] alloc_empty_file+0x72/0x170 [ 846.552949][T32274] path_openat+0xef/0x4630 [ 846.557368][T32274] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 846.563174][T32274] ? kasan_slab_alloc+0xf/0x20 [ 846.567938][T32274] ? kmem_cache_alloc+0x121/0x710 [ 846.572960][T32274] ? getname_flags+0xd6/0x5b0 [ 846.577639][T32274] ? getname+0x1a/0x20 [ 846.581713][T32274] ? do_sys_open+0x2c9/0x5d0 [ 846.586304][T32274] ? __x64_sys_open+0x7e/0xc0 [ 846.590983][T32274] ? do_syscall_64+0xfa/0x760 [ 846.595665][T32274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.601771][T32274] ? lock_downgrade+0x920/0x920 [ 846.606631][T32274] ? current_time+0x6b/0x140 [ 846.611228][T32274] ? __kasan_check_read+0x11/0x20 [ 846.616273][T32274] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 846.621651][T32274] ? shmem_setattr+0x4c7/0xc80 [ 846.626417][T32274] ? __kasan_check_read+0x11/0x20 [ 846.631443][T32274] ? kmem_cache_alloc+0x58e/0x710 [ 846.636474][T32274] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 846.642201][T32274] do_filp_open+0x1a1/0x280 [ 846.646709][T32274] ? may_open_dev+0x100/0x100 [ 846.651392][T32274] ? lock_downgrade+0x920/0x920 [ 846.656237][T32274] ? rwlock_bug.part.0+0x90/0x90 [ 846.661182][T32274] ? __alloc_fd+0x35/0x620 [ 846.665603][T32274] ? __kasan_check_read+0x11/0x20 [ 846.670628][T32274] ? do_raw_spin_unlock+0x57/0x270 [ 846.675772][T32274] ? _raw_spin_unlock+0x2d/0x50 [ 846.680631][T32274] ? __alloc_fd+0x487/0x620 [ 846.685141][T32274] do_sys_open+0x3fe/0x5d0 [ 846.689560][T32274] ? filp_open+0x80/0x80 [ 846.693807][T32274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 846.700056][T32274] ? fput+0x1b/0x20 [ 846.703958][T32274] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 846.710027][T32274] __x64_sys_open+0x7e/0xc0 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 846.714536][T32274] do_syscall_64+0xfa/0x760 [ 846.719052][T32274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.724939][T32274] RIP: 0033:0x413711 [ 846.724955][T32274] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 846.724962][T32274] RSP: 002b:00007f959e2f4a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 846.724981][T32274] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 846.748457][T32274] RDX: 00007f959e2f4b0a RSI: 0000000000000002 RDI: 00007f959e2f4b00 [ 846.748465][T32274] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 846.748473][T32274] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 846.748481][T32274] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:39 executing program 4 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:39 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:39 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:39 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x242) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10002, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@routing={0x17, 0x2, 0x1, 0x7f, 0x0, [@mcast1]}, 0x18) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5507) 04:51:39 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x400000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:39 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 846.996378][T32635] FAULT_INJECTION: forcing a failure. [ 846.996378][T32635] name failslab, interval 1, probability 0, space 0, times 0 04:51:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x550b) 04:51:39 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xfff, 0x100) [ 847.121983][T32635] CPU: 1 PID: 32635 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 847.131135][T32635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.141192][T32635] Call Trace: [ 847.144494][T32635] dump_stack+0x172/0x1f0 [ 847.148839][T32635] should_fail.cold+0xa/0x15 [ 847.153436][T32635] ? fault_create_debugfs_attr+0x180/0x180 [ 847.153452][T32635] ? page_to_nid.part.0+0x20/0x20 [ 847.153468][T32635] ? ___might_sleep+0x163/0x280 [ 847.153490][T32635] __should_failslab+0x121/0x190 [ 847.164302][T32635] should_failslab+0x9/0x14 [ 847.178539][T32635] kmem_cache_alloc+0x2aa/0x710 [ 847.178555][T32635] ? memcg_kmem_put_cache+0x3e/0x50 [ 847.178574][T32635] ? kmem_cache_alloc+0x314/0x710 [ 847.188603][T32635] security_file_alloc+0x39/0x170 [ 847.188621][T32635] __alloc_file+0xde/0x340 [ 847.188641][T32635] alloc_empty_file+0x72/0x170 [ 847.198654][T32635] path_openat+0xef/0x4630 [ 847.198669][T32635] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 847.198688][T32635] ? kasan_slab_alloc+0xf/0x20 [ 847.222766][T32635] ? kmem_cache_alloc+0x121/0x710 [ 847.227796][T32635] ? getname_flags+0xd6/0x5b0 [ 847.227806][T32635] ? getname+0x1a/0x20 [ 847.227817][T32635] ? do_sys_open+0x2c9/0x5d0 [ 847.227829][T32635] ? __x64_sys_open+0x7e/0xc0 [ 847.227850][T32635] ? do_syscall_64+0xfa/0x760 [ 847.241136][T32635] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.241154][T32635] ? __isolate_free_page+0x4c0/0x4c0 [ 847.241176][T32635] ? __kasan_check_read+0x11/0x20 [ 847.266866][T32635] ? path_lookupat.isra.0+0x8d0/0x8d0 04:51:39 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80000001, 0x6000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)={0x7}) 04:51:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x550f) [ 847.272247][T32635] ? __kasan_check_read+0x11/0x20 [ 847.277291][T32635] ? __alloc_pages_nodemask+0x578/0x900 [ 847.282847][T32635] ? cache_grow_end+0xa4/0x190 [ 847.287619][T32635] ? __kasan_check_read+0x11/0x20 [ 847.292658][T32635] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 847.298385][T32635] do_filp_open+0x1a1/0x280 [ 847.302891][T32635] ? may_open_dev+0x100/0x100 [ 847.307573][T32635] ? lock_downgrade+0x920/0x920 [ 847.312436][T32635] ? rwlock_bug.part.0+0x90/0x90 [ 847.317379][T32635] ? __alloc_fd+0x35/0x620 [ 847.321805][T32635] ? __kasan_check_read+0x11/0x20 [ 847.326833][T32635] ? do_raw_spin_unlock+0x57/0x270 [ 847.331947][T32635] ? _raw_spin_unlock+0x2d/0x50 [ 847.336800][T32635] ? __alloc_fd+0x487/0x620 [ 847.341307][T32635] do_sys_open+0x3fe/0x5d0 [ 847.345719][T32635] ? filp_open+0x80/0x80 [ 847.345734][T32635] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 847.345757][T32635] ? fput+0x1b/0x20 [ 847.345772][T32635] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 847.345785][T32635] __x64_sys_open+0x7e/0xc0 [ 847.345802][T32635] do_syscall_64+0xfa/0x760 [ 847.345821][T32635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.380972][T32635] RIP: 0033:0x413711 [ 847.384872][T32635] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 847.404480][T32635] RSP: 002b:00007f959e2f4a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 847.412894][T32635] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 847.420865][T32635] RDX: 00007f959e2f4b0a RSI: 0000000000000002 RDI: 00007f959e2f4b00 [ 847.428833][T32635] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 847.428841][T32635] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 847.428849][T32635] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:39 executing program 4 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:39 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:39 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x100, 0x100) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) setsockopt$inet6_int(r1, 0x29, 0xff, &(0x7f0000000100)=0x80000000, 0x4) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x3b, @remote, 0x4e20, 0x4, 'lc\x00', 0x8, 0xfff, 0x2f}, 0x2c) 04:51:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5525) 04:51:39 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:39 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5546) [ 847.767264][ T616] FAULT_INJECTION: forcing a failure. [ 847.767264][ T616] name failslab, interval 1, probability 0, space 0, times 0 [ 847.816710][ T616] CPU: 0 PID: 616 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 847.825693][ T616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.835752][ T616] Call Trace: [ 847.839058][ T616] dump_stack+0x172/0x1f0 [ 847.843406][ T616] should_fail.cold+0xa/0x15 [ 847.848014][ T616] ? fault_create_debugfs_attr+0x180/0x180 [ 847.853828][ T616] ? page_to_nid.part.0+0x20/0x20 [ 847.858858][ T616] ? ___might_sleep+0x163/0x280 [ 847.863719][ T616] __should_failslab+0x121/0x190 [ 847.868662][ T616] should_failslab+0x9/0x14 [ 847.873165][ T616] kmem_cache_alloc+0x2aa/0x710 [ 847.878018][ T616] ? memcg_kmem_put_cache+0x3e/0x50 [ 847.883218][ T616] ? kmem_cache_alloc+0x314/0x710 [ 847.888277][ T616] security_file_alloc+0x39/0x170 [ 847.893310][ T616] __alloc_file+0xde/0x340 [ 847.897730][ T616] alloc_empty_file+0x72/0x170 [ 847.902501][ T616] path_openat+0xef/0x4630 [ 847.906920][ T616] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 847.912727][ T616] ? kasan_slab_alloc+0xf/0x20 [ 847.917490][ T616] ? kmem_cache_alloc+0x121/0x710 [ 847.922516][ T616] ? getname_flags+0xd6/0x5b0 [ 847.927193][ T616] ? getname+0x1a/0x20 [ 847.931273][ T616] ? do_sys_open+0x2c9/0x5d0 [ 847.935865][ T616] ? __x64_sys_open+0x7e/0xc0 [ 847.940544][ T616] ? do_syscall_64+0xfa/0x760 [ 847.940561][ T616] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.940582][ T616] ? __isolate_free_page+0x4c0/0x4c0 [ 847.951303][ T616] ? __kasan_check_read+0x11/0x20 [ 847.951328][ T616] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 847.966949][ T616] ? __kasan_check_read+0x11/0x20 [ 847.971976][ T616] ? __alloc_pages_nodemask+0x578/0x900 [ 847.977523][ T616] ? cache_grow_end+0xa4/0x190 [ 847.982291][ T616] ? __kasan_check_read+0x11/0x20 [ 847.987326][ T616] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 847.993054][ T616] do_filp_open+0x1a1/0x280 [ 847.997560][ T616] ? may_open_dev+0x100/0x100 [ 848.002244][ T616] ? lock_downgrade+0x920/0x920 [ 848.007106][ T616] ? rwlock_bug.part.0+0x90/0x90 [ 848.012048][ T616] ? __alloc_fd+0x35/0x620 [ 848.016475][ T616] ? __kasan_check_read+0x11/0x20 [ 848.021541][ T616] ? do_raw_spin_unlock+0x57/0x270 [ 848.026661][ T616] ? _raw_spin_unlock+0x2d/0x50 [ 848.031522][ T616] ? __alloc_fd+0x487/0x620 [ 848.036034][ T616] do_sys_open+0x3fe/0x5d0 [ 848.040458][ T616] ? filp_open+0x80/0x80 [ 848.044709][ T616] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 848.050955][ T616] ? fput+0x1b/0x20 [ 848.054768][ T616] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 848.060837][ T616] __x64_sys_open+0x7e/0xc0 [ 848.065345][ T616] do_syscall_64+0xfa/0x760 [ 848.069855][ T616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.075740][ T616] RIP: 0033:0x413711 [ 848.075755][ T616] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 848.075761][ T616] RSP: 002b:00007f959e2f4a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 848.075774][ T616] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 04:51:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:40 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:40 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 848.075789][ T616] RDX: 00007f959e2f4b0a RSI: 0000000000000002 RDI: 00007f959e2f4b00 [ 848.123619][ T616] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 848.131596][ T616] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 848.139573][ T616] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:40 executing program 4 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x8000, 0xf8, 0x5}) 04:51:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x6364) 04:51:40 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:40 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 848.468977][ T901] FAULT_INJECTION: forcing a failure. [ 848.468977][ T901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 848.482230][ T901] CPU: 1 PID: 901 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 848.491260][ T901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.501326][ T901] Call Trace: [ 848.504641][ T901] dump_stack+0x172/0x1f0 [ 848.508991][ T901] should_fail.cold+0xa/0x15 [ 848.513635][ T901] ? fault_create_debugfs_attr+0x180/0x180 04:51:40 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x1f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x5}, 0x8) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x9}) 04:51:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x8912) [ 848.519458][ T901] should_fail_alloc_page+0x50/0x60 [ 848.524754][ T901] __alloc_pages_nodemask+0x1a1/0x900 [ 848.530141][ T901] ? lock_downgrade+0x920/0x920 [ 848.535089][ T901] ? __alloc_pages_slowpath+0x2520/0x2520 [ 848.540815][ T901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.546545][ T901] ? fault_create_debugfs_attr+0x180/0x180 [ 848.552352][ T901] cache_grow_begin+0x90/0xd20 [ 848.557124][ T901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 848.563367][ T901] __kmalloc+0x6b2/0x770 [ 848.567705][ T901] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 848.573437][ T901] tomoyo_realpath_from_path+0xcd/0x7b0 [ 848.578987][ T901] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 848.585241][ T901] tomoyo_check_open_permission+0x2a8/0x3f0 [ 848.591138][ T901] ? tomoyo_path_number_perm+0x520/0x520 [ 848.596799][ T901] ? lock_downgrade+0x920/0x920 [ 848.601658][ T901] ? rwlock_bug.part.0+0x90/0x90 [ 848.606608][ T901] ? lockref_get+0x16/0x60 [ 848.611031][ T901] tomoyo_file_open+0xa9/0xd0 [ 848.615714][ T901] security_file_open+0x71/0x300 [ 848.620699][ T901] do_dentry_open+0x373/0x1250 [ 848.625467][ T901] ? match_exception_partial+0x242/0x2d0 [ 848.631106][ T901] ? chown_common+0x5c0/0x5c0 [ 848.635796][ T901] ? inode_permission+0xb4/0x560 [ 848.640755][ T901] vfs_open+0xa0/0xd0 [ 848.644753][ T901] path_openat+0x10e9/0x4630 [ 848.649351][ T901] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 848.655169][ T901] ? kasan_slab_alloc+0xf/0x20 [ 848.659933][ T901] ? kmem_cache_alloc+0x121/0x710 [ 848.664961][ T901] ? getname_flags+0xd6/0x5b0 04:51:40 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 848.664973][ T901] ? getname+0x1a/0x20 [ 848.664985][ T901] ? do_sys_open+0x2c9/0x5d0 [ 848.665008][ T901] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 848.665022][ T901] ? __alloc_pages_nodemask+0x578/0x900 [ 848.665036][ T901] ? cache_grow_end+0xa4/0x190 [ 848.665056][ T901] ? __kasan_check_read+0x11/0x20 [ 848.689306][ T901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.689322][ T901] do_filp_open+0x1a1/0x280 [ 848.689336][ T901] ? may_open_dev+0x100/0x100 [ 848.689357][ T901] ? __kasan_check_read+0x11/0x20 [ 848.704821][ T901] ? do_raw_spin_unlock+0x57/0x270 [ 848.704838][ T901] ? _raw_spin_unlock+0x2d/0x50 [ 848.704859][ T901] ? __alloc_fd+0x487/0x620 [ 848.733451][ T901] do_sys_open+0x3fe/0x5d0 [ 848.737874][ T901] ? filp_open+0x80/0x80 [ 848.742123][ T901] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 848.748374][ T901] ? fput+0x1b/0x20 [ 848.752191][ T901] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 848.758263][ T901] __x64_sys_open+0x7e/0xc0 [ 848.758282][ T901] do_syscall_64+0xfa/0x760 04:51:41 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 848.758298][ T901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.758308][ T901] RIP: 0033:0x413711 [ 848.758322][ T901] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 848.758329][ T901] RSP: 002b:00007f959e2f4a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 848.758349][ T901] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 04:51:41 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18, 0xd, 0x1, {{0x8, 0x1, 0x6}, 0x200}}, 0x18) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3ff) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000040)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x88000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x58, r3, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffe1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 04:51:41 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 848.773220][ T901] RDX: 00007f959e2f4b0a RSI: 0000000000000002 RDI: 00007f959e2f4b00 [ 848.773228][ T901] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 848.773251][ T901] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 848.773259][ T901] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:41 executing program 4 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x8933) 04:51:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:41 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:41 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x110) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000040)=0x741) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:41 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:41 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x89f3) [ 849.184860][ T1315] FAULT_INJECTION: forcing a failure. [ 849.184860][ T1315] name failslab, interval 1, probability 0, space 0, times 0 [ 849.229865][ T1315] CPU: 1 PID: 1315 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 849.238927][ T1315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.248983][ T1315] Call Trace: [ 849.252288][ T1315] dump_stack+0x172/0x1f0 [ 849.256699][ T1315] should_fail.cold+0xa/0x15 [ 849.261300][ T1315] ? fault_create_debugfs_attr+0x180/0x180 [ 849.267115][ T1315] ? ___might_sleep+0x163/0x280 [ 849.271973][ T1315] __should_failslab+0x121/0x190 [ 849.276919][ T1315] should_failslab+0x9/0x14 [ 849.281426][ T1315] __kmalloc+0x2e0/0x770 [ 849.285679][ T1315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.291926][ T1315] ? d_absolute_path+0x11b/0x170 [ 849.296870][ T1315] ? __d_path+0x140/0x140 [ 849.301207][ T1315] ? tomoyo_encode2.part.0+0xf5/0x400 [ 849.306583][ T1315] tomoyo_encode2.part.0+0xf5/0x400 [ 849.311788][ T1315] tomoyo_encode+0x2b/0x50 [ 849.316211][ T1315] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 849.321848][ T1315] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:51:41 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 849.328095][ T1315] tomoyo_check_open_permission+0x2a8/0x3f0 [ 849.333992][ T1315] ? tomoyo_path_number_perm+0x520/0x520 [ 849.339638][ T1315] ? lock_downgrade+0x920/0x920 [ 849.344487][ T1315] ? rwlock_bug.part.0+0x90/0x90 [ 849.349428][ T1315] ? lockref_get+0x16/0x60 [ 849.353855][ T1315] tomoyo_file_open+0xa9/0xd0 [ 849.358539][ T1315] security_file_open+0x71/0x300 [ 849.363483][ T1315] do_dentry_open+0x373/0x1250 [ 849.368253][ T1315] ? match_exception_partial+0x242/0x2d0 [ 849.373889][ T1315] ? chown_common+0x5c0/0x5c0 [ 849.378576][ T1315] ? inode_permission+0xb4/0x560 [ 849.383520][ T1315] vfs_open+0xa0/0xd0 [ 849.383542][ T1315] path_openat+0x10e9/0x4630 [ 849.392086][ T1315] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 849.392099][ T1315] ? kasan_slab_alloc+0xf/0x20 [ 849.392118][ T1315] ? kmem_cache_alloc+0x121/0x710 [ 849.407669][ T1315] ? getname_flags+0xd6/0x5b0 [ 849.412350][ T1315] ? getname+0x1a/0x20 [ 849.416425][ T1315] ? do_sys_open+0x2c9/0x5d0 [ 849.421028][ T1315] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 849.426405][ T1315] ? __alloc_pages_nodemask+0x578/0x900 [ 849.431959][ T1315] ? cache_grow_end+0xa4/0x190 [ 849.436728][ T1315] ? __kasan_check_read+0x11/0x20 [ 849.441775][ T1315] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 849.447505][ T1315] do_filp_open+0x1a1/0x280 [ 849.452010][ T1315] ? may_open_dev+0x100/0x100 [ 849.456702][ T1315] ? __kasan_check_read+0x11/0x20 [ 849.461739][ T1315] ? do_raw_spin_unlock+0x57/0x270 [ 849.466859][ T1315] ? _raw_spin_unlock+0x2d/0x50 [ 849.471710][ T1315] ? __alloc_fd+0x487/0x620 [ 849.476232][ T1315] do_sys_open+0x3fe/0x5d0 04:51:41 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x485, 0x149000) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @loopback}, 0x0, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000080)="4899ea17a7677005c894e628e15462ad52000752ccf5005f824380328840ee180130467b3020d2016a2162e4494f4196cf", 0x31}, {&(0x7f0000000180)="a78e348d9177d9fdec1e505a7fcc6d32c2f4ed03d90d6be31719b85ba984ccd7670b126e1f5d92d7fd36057bd25fb9576a1c3fead5e4ef4b1716e817b233fd37169c9a9b3fe63cd834fba3b59a732fe8", 0x50}, {&(0x7f0000000200)="67a2559f7f2568e5f5800aa221f6aba4351621239e9d5164fa8307550c850076798487976c48d3cc44eb44f955", 0x2d}, {&(0x7f0000000240)="dbc377be01696a4a661694b7c3ce984528c570a0a01d89fc641eda38ff15250dc1bfbd8a7439c15ad0417e4d214323f8295a249efd187fcce040283be9e75f5a4a5fdbc252212c44a11ee7f1c279", 0x4e}, {&(0x7f0000000340)="68ca23d05f71cfb78d174c75da02a19b7d03409d5008f22ff44a7b62e7ce5cd920e8381e30c19a3a8d71a552fc422f3cd2edcd51ffe7e39141782ef4b1bb23505470c113aa1663ecf7bf5fcb657683e1c44470a692ab4f30a95529cbf548615d9907e9762e07b5b6345c40e2f4f5ef209658dc7ebf53742bb5faac4b4d4870cdf1647eff70f0806b05ce816e96ff700d", 0x90}], 0x5, &(0x7f0000000480)=[{0x1010, 0x113, 0x0, "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"}, {0x100, 0x111, 0x7, "12b09115a888527071afb72ed8d7bed5979b9498c071603aa3243be736ea7f30113f6ba9f002d846f8536b4b569f12aacf4ff195915269535ca13fb39d04457031571300df322bcdaee79b6887603a11fc840739ece1b321766fba280c4ad5ac79b96ffa691f320d11fa18ac2d3ec23f6f3968def2cc50fb564139d79b0e866cfcd89513b280c30bcca053b46ed5506c478aaccb6464b0328232be0621f04002e4c76980e59415614ede81384cc438fbc1341bf00f488b1e86f802873796a5df8a238050f841241d43a2171ddce8827b1f0eb47403777dad1258a27b87882db48261d6c8ce8e6b96cf6c"}, {0xb8, 0x13f, 0xd9, "b6f2879fc76049a5bb95f38281989b19c6296920f856b19b2f8920828d2cdeca6579577054c3c09e145d316e747d1a11e681dedbade1c229a8180f12ceb28753a2c8e9af48a79f96cc8fb1b304d5cfecd26527d7651c698e6b1613e570a5e6c6dc3c664595cd0b4b94ef3fda4f6210709939d9881b0fe21fc1b379d1d188c4bab7771c72fd39e7c5cdaf55fce5294cfcb98937ba45f8623d3d82baa8877e5ceb69146424dd1e"}, {0xe0, 0x11e, 0x732, "ded3c4a63773f245b6448c2c3ff1681cb5b19370c05af578d86d58b05028242cc85d9974421be8606cda9dca4b7608b1f8da3e7485d660944d3d55e226e489848c96822ca84fa329ec4e5dae21b5ac2cd43e4122230c723461a83db7a5f3d069b42c4a1c2c880e13fc82a1e4785b85b1212ac5b6f6e24a5122318013c9a491b0d29994cb98ce2d921bdf746eab5ca078807769bcbc1c7b6748d29eaa01e443a7e240deeb24e8263336cc54b9ff83f63d80ed6ed9ff1bcd42be4864bc5e78d0ff06072d45efb92a26113ae24181d9a483"}, {0xb0, 0x10c, 0xf2, "6e890768b2044fa33b216eef0899e96ebc2e109c389a782430ec251d2330e8b86ee8ed1b9e11bfd2035db85f95e9c73cb9865cf8843afe06d1b7328c9e73f507cb9b785a460e81018fc60194cc14e6f4c4ac28bd37df4821a440e36e9cce412a0a12d523d4165c8a71f6b89467b53e7e57c7ee4e096920abe47b86d0dc75b087586f56d19c3b1dca60a81c0ff96cf74e1d41c8742062f651675f"}, {0x98, 0x102, 0x1, "10f9b599a873c84f85c5d8ab5f34962b7a597e61052b9b0551a99f86500e62de1ad7f30f651e61ab233ffb3b79559d88830a072ce59a80186aa7cbd2e61be368a3ee9331899e63209d5b6e9d12ca35b5e924c2c7a542a221289fa32b4cc8c260b552653a4790412627ed77afc33c3673b6b159a3e66fcad221f3de69d6412156e8025403079046"}], 0x13f0}, 0x20000040) 04:51:41 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 849.480654][ T1315] ? filp_open+0x80/0x80 [ 849.484907][ T1315] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 849.491151][ T1315] ? fput+0x1b/0x20 [ 849.494967][ T1315] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 849.501083][ T1315] __x64_sys_open+0x7e/0xc0 [ 849.505622][ T1315] do_syscall_64+0xfa/0x760 [ 849.510135][ T1315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.516027][ T1315] RIP: 0033:0x413711 04:51:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x5000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 849.519928][ T1315] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 849.539533][ T1315] RSP: 002b:00007f959e2f4a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 849.547937][ T1315] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 849.547945][ T1315] RDX: 00007f959e2f4b0a RSI: 0000000000000002 RDI: 00007f959e2f4b00 [ 849.547952][ T1315] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 849.547959][ T1315] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 849.547967][ T1315] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 849.553282][ T1315] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:42 executing program 4 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:42 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x9201) 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = dup3(r0, r0, 0xf00124f3291d3464) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000000)={0x0, @bt={0x4, 0x7, 0x1, 0x1, 0x0, 0x4, 0x9, 0x80000001, 0x1, 0xfff, 0x1, 0x300000, 0x1000, 0x6, 0x15}}) 04:51:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x6000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xff02) 04:51:42 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 849.940169][ T1763] FAULT_INJECTION: forcing a failure. [ 849.940169][ T1763] name failslab, interval 1, probability 0, space 0, times 0 [ 849.978678][ T1763] CPU: 0 PID: 1763 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 849.987733][ T1763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.997791][ T1763] Call Trace: [ 849.997821][ T1763] dump_stack+0x172/0x1f0 [ 849.997847][ T1763] should_fail.cold+0xa/0x15 [ 850.010018][ T1763] ? fault_create_debugfs_attr+0x180/0x180 [ 850.010040][ T1763] ? ___might_sleep+0x163/0x280 [ 850.020673][ T1763] __should_failslab+0x121/0x190 [ 850.025617][ T1763] should_failslab+0x9/0x14 [ 850.030123][ T1763] __kmalloc+0x2e0/0x770 [ 850.034378][ T1763] ? mark_held_locks+0xf0/0xf0 [ 850.039149][ T1763] ? kasan_slab_alloc+0xf/0x20 [ 850.043914][ T1763] ? kmem_cache_alloc+0x121/0x710 [ 850.048946][ T1763] ? getname_flags+0xd6/0x5b0 [ 850.053626][ T1763] ? getname+0x1a/0x20 [ 850.057700][ T1763] ? do_sys_open+0x2c9/0x5d0 [ 850.062297][ T1763] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 850.068022][ T1763] tomoyo_realpath_from_path+0xcd/0x7b0 [ 850.073570][ T1763] ? tomoyo_path_number_perm+0x193/0x520 [ 850.079209][ T1763] tomoyo_path_number_perm+0x1dd/0x520 [ 850.084679][ T1763] ? tomoyo_path_number_perm+0x193/0x520 [ 850.090316][ T1763] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 850.096123][ T1763] ? __kasan_check_read+0x11/0x20 [ 850.101155][ T1763] ? __kasan_check_read+0x11/0x20 [ 850.106198][ T1763] ? __fget+0x384/0x560 [ 850.110364][ T1763] ? ksys_dup3+0x3e0/0x3e0 [ 850.114782][ T1763] ? do_sys_open+0x31d/0x5d0 [ 850.119373][ T1763] tomoyo_file_ioctl+0x23/0x30 [ 850.124148][ T1763] security_file_ioctl+0x77/0xc0 [ 850.129103][ T1763] ksys_ioctl+0x57/0xd0 [ 850.133305][ T1763] __x64_sys_ioctl+0x73/0xb0 [ 850.137902][ T1763] do_syscall_64+0xfa/0x760 [ 850.142414][ T1763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.148308][ T1763] RIP: 0033:0x459697 [ 850.152205][ T1763] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 850.171822][ T1763] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 850.180235][ T1763] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 850.188221][ T1763] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 850.196205][ T1763] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 850.204178][ T1763] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 850.212150][ T1763] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x400454ca) [ 850.280019][ T1763] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:42 executing program 4 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0xf) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f0000000040)='/dev/dri/card#\x00', &(0x7f0000000080)='./file0\x00', r2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000300)={0x1}) ioctl$FICLONE(r0, 0x40049409, r1) getsockopt$sock_int(r2, 0x1, 0x5, 0x0, &(0x7f0000000100)) 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x400454e2) 04:51:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x7000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:42 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 850.506836][ T2011] FAULT_INJECTION: forcing a failure. [ 850.506836][ T2011] name failslab, interval 1, probability 0, space 0, times 0 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 850.556905][ T2011] CPU: 1 PID: 2011 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 850.565962][ T2011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.576018][ T2011] Call Trace: [ 850.579324][ T2011] dump_stack+0x172/0x1f0 [ 850.583682][ T2011] should_fail.cold+0xa/0x15 [ 850.588280][ T2011] ? fault_create_debugfs_attr+0x180/0x180 [ 850.594111][ T2011] ? ___might_sleep+0x163/0x280 [ 850.594128][ T2011] __should_failslab+0x121/0x190 [ 850.594145][ T2011] should_failslab+0x9/0x14 [ 850.594158][ T2011] __kmalloc+0x2e0/0x770 [ 850.594179][ T2011] ? mark_held_locks+0xf0/0xf0 [ 850.617457][ T2011] ? kasan_slab_alloc+0xf/0x20 [ 850.622219][ T2011] ? kmem_cache_alloc+0x121/0x710 [ 850.627239][ T2011] ? getname_flags+0xd6/0x5b0 [ 850.631916][ T2011] ? getname+0x1a/0x20 [ 850.635983][ T2011] ? do_sys_open+0x2c9/0x5d0 [ 850.640579][ T2011] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 850.646306][ T2011] tomoyo_realpath_from_path+0xcd/0x7b0 [ 850.651854][ T2011] ? tomoyo_path_number_perm+0x193/0x520 04:51:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40045564) [ 850.657490][ T2011] tomoyo_path_number_perm+0x1dd/0x520 [ 850.662970][ T2011] ? tomoyo_path_number_perm+0x193/0x520 [ 850.669738][ T2011] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 850.675558][ T2011] ? __kasan_check_read+0x11/0x20 [ 850.680592][ T2011] ? __kasan_check_read+0x11/0x20 [ 850.685633][ T2011] ? __fget+0x384/0x560 [ 850.689798][ T2011] ? ksys_dup3+0x3e0/0x3e0 [ 850.694222][ T2011] ? do_sys_open+0x31d/0x5d0 [ 850.698819][ T2011] tomoyo_file_ioctl+0x23/0x30 04:51:42 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 850.703592][ T2011] security_file_ioctl+0x77/0xc0 [ 850.708541][ T2011] ksys_ioctl+0x57/0xd0 [ 850.712705][ T2011] __x64_sys_ioctl+0x73/0xb0 [ 850.717310][ T2011] do_syscall_64+0xfa/0x760 [ 850.721830][ T2011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.727728][ T2011] RIP: 0033:0x459697 [ 850.731725][ T2011] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x4000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x8000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 850.751337][ T2011] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 850.759777][ T2011] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 850.759785][ T2011] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 850.759792][ T2011] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 850.759799][ T2011] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 850.759806][ T2011] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 850.800759][ T2011] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40045565) 04:51:43 executing program 4 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:43 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) getgroups(0x7, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90, 0xfffffffffffffffe, 0x7, {0x1, 0x0, 0x7f, 0x3, 0x5, 0x2, {0x2, 0xfffffffffffffff9, 0x7fff, 0x3, 0x2, 0xb692, 0x1000, 0x80, 0x10000, 0x7fff, 0x0, r1, r2, 0x7, 0x6}}}, 0x90) [ 851.058345][ T2358] FAULT_INJECTION: forcing a failure. [ 851.058345][ T2358] name failslab, interval 1, probability 0, space 0, times 0 04:51:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40045566) 04:51:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 851.141882][ T2358] CPU: 0 PID: 2358 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 851.150948][ T2358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.161003][ T2358] Call Trace: [ 851.161032][ T2358] dump_stack+0x172/0x1f0 [ 851.161055][ T2358] should_fail.cold+0xa/0x15 [ 851.161080][ T2358] ? fault_create_debugfs_attr+0x180/0x180 [ 851.179070][ T2358] ? ___might_sleep+0x163/0x280 [ 851.183932][ T2358] __should_failslab+0x121/0x190 [ 851.188881][ T2358] should_failslab+0x9/0x14 [ 851.193391][ T2358] __kmalloc+0x2e0/0x770 [ 851.197641][ T2358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.203892][ T2358] ? d_absolute_path+0x11b/0x170 [ 851.208836][ T2358] ? __d_path+0x140/0x140 [ 851.213199][ T2358] ? tomoyo_encode2.part.0+0xf5/0x400 [ 851.218590][ T2358] tomoyo_encode2.part.0+0xf5/0x400 [ 851.223800][ T2358] tomoyo_encode+0x2b/0x50 [ 851.228221][ T2358] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 851.233868][ T2358] tomoyo_path_number_perm+0x1dd/0x520 [ 851.239338][ T2358] ? tomoyo_path_number_perm+0x193/0x520 [ 851.244980][ T2358] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 851.250785][ T2358] ? __kasan_check_read+0x11/0x20 [ 851.255815][ T2358] ? __kasan_check_read+0x11/0x20 [ 851.260852][ T2358] ? __fget+0x384/0x560 [ 851.265022][ T2358] ? ksys_dup3+0x3e0/0x3e0 [ 851.269450][ T2358] ? do_sys_open+0x31d/0x5d0 [ 851.274057][ T2358] tomoyo_file_ioctl+0x23/0x30 [ 851.278838][ T2358] security_file_ioctl+0x77/0xc0 [ 851.283789][ T2358] ksys_ioctl+0x57/0xd0 [ 851.287951][ T2358] __x64_sys_ioctl+0x73/0xb0 04:51:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:43 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:43 executing program 2: ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x7}) [ 851.292559][ T2358] do_syscall_64+0xfa/0x760 [ 851.297125][ T2358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.303013][ T2358] RIP: 0033:0x459697 [ 851.303030][ T2358] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 851.303037][ T2358] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 851.334962][ T2358] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459697 [ 851.334971][ T2358] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 851.334979][ T2358] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 851.334987][ T2358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 851.334995][ T2358] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:43 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.syz\x00') [ 851.468511][ T2358] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:43 executing program 4 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40045567) 04:51:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:43 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:43 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40045568) [ 851.743957][ T2788] FAULT_INJECTION: forcing a failure. [ 851.743957][ T2788] name failslab, interval 1, probability 0, space 0, times 0 04:51:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = dup3(r0, r0, 0x80000) write$FUSE_DIRENT(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="e8000000f5ffffff08000000000000000400000000000000060075b81800000000000000000000000000000200000000000000018000000000000000000000ffffff7f020000000000000000000000000000000f000000260500002f6465762f6472692f636172642300000400000000000000d600000000000000090000000100000062646576657468305d0000000000000000000000000000000acf4178000000001d00000004000000776c616e31637075736574656d303a73656375726974797b776c616e300000000400000000000000ff0f0000000000000700000005000000766d6e6574"], 0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xc6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x5}, 0x8) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000000)=[r0, r0, r0, r0, r0, r0, r0, r0, r0], 0x9) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e23, 0x80000001, @empty, 0x1}}, 0x100000001, 0x8}, 0x90) [ 851.819445][ T2788] CPU: 1 PID: 2788 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 851.828510][ T2788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.838572][ T2788] Call Trace: [ 851.841870][ T2788] dump_stack+0x172/0x1f0 [ 851.846229][ T2788] should_fail.cold+0xa/0x15 [ 851.850827][ T2788] ? fault_create_debugfs_attr+0x180/0x180 [ 851.856639][ T2788] ? ksys_dup3+0x3e0/0x3e0 [ 851.861067][ T2788] ? ___might_sleep+0x163/0x280 [ 851.865922][ T2788] __should_failslab+0x121/0x190 [ 851.870860][ T2788] should_failslab+0x9/0x14 [ 851.875361][ T2788] __kmalloc+0x2e0/0x770 [ 851.879602][ T2788] ? mark_held_locks+0xf0/0xf0 [ 851.884362][ T2788] ? __kasan_check_read+0x11/0x20 [ 851.889391][ T2788] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 851.895118][ T2788] tomoyo_realpath_from_path+0xcd/0x7b0 [ 851.900660][ T2788] ? tomoyo_path_number_perm+0x193/0x520 [ 851.906292][ T2788] tomoyo_path_number_perm+0x1dd/0x520 [ 851.911745][ T2788] ? tomoyo_path_number_perm+0x193/0x520 [ 851.917379][ T2788] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 851.923182][ T2788] ? __kasan_check_read+0x11/0x20 [ 851.928208][ T2788] ? __kasan_check_read+0x11/0x20 [ 851.933251][ T2788] ? __fget+0x384/0x560 [ 851.937408][ T2788] ? ksys_dup3+0x3e0/0x3e0 [ 851.941822][ T2788] ? do_sys_open+0x31d/0x5d0 [ 851.946413][ T2788] tomoyo_file_ioctl+0x23/0x30 [ 851.951175][ T2788] security_file_ioctl+0x77/0xc0 [ 851.956457][ T2788] ksys_ioctl+0x57/0xd0 [ 851.960613][ T2788] __x64_sys_ioctl+0x73/0xb0 [ 851.965205][ T2788] do_syscall_64+0xfa/0x760 [ 851.969731][ T2788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.975620][ T2788] RIP: 0033:0x459697 [ 851.979511][ T2788] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 851.999114][ T2788] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 852.007528][ T2788] RAX: ffffffffffffffda RBX: 00007f959e2f56d4 RCX: 0000000000459697 04:51:44 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 852.015500][ T2788] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 852.023474][ T2788] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 852.031442][ T2788] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 852.039404][ T2788] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:44 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:44 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 852.136860][ T2788] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40045569) 04:51:44 executing program 4 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='attr\x00') 04:51:44 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:44 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4004556a) 04:51:44 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 852.506534][ T3184] FAULT_INJECTION: forcing a failure. [ 852.506534][ T3184] name failslab, interval 1, probability 0, space 0, times 0 [ 852.549150][ T3184] CPU: 0 PID: 3184 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 852.558206][ T3184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.568277][ T3184] Call Trace: [ 852.571602][ T3184] dump_stack+0x172/0x1f0 [ 852.575948][ T3184] should_fail.cold+0xa/0x15 [ 852.580552][ T3184] ? fault_create_debugfs_attr+0x180/0x180 [ 852.586362][ T3184] ? ksys_dup3+0x3e0/0x3e0 [ 852.590784][ T3184] ? ___might_sleep+0x163/0x280 [ 852.595643][ T3184] __should_failslab+0x121/0x190 [ 852.600588][ T3184] should_failslab+0x9/0x14 [ 852.605095][ T3184] __kmalloc+0x2e0/0x770 [ 852.609348][ T3184] ? mark_held_locks+0xf0/0xf0 [ 852.614120][ T3184] ? __kasan_check_read+0x11/0x20 [ 852.619145][ T3184] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 852.624866][ T3184] tomoyo_realpath_from_path+0xcd/0x7b0 [ 852.630415][ T3184] ? tomoyo_path_number_perm+0x193/0x520 [ 852.636051][ T3184] tomoyo_path_number_perm+0x1dd/0x520 [ 852.641512][ T3184] ? tomoyo_path_number_perm+0x193/0x520 [ 852.647408][ T3184] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 852.653206][ T3184] ? __kasan_check_read+0x11/0x20 [ 852.653225][ T3184] ? __kasan_check_read+0x11/0x20 [ 852.653265][ T3184] ? __fget+0x384/0x560 [ 852.667438][ T3184] ? ksys_dup3+0x3e0/0x3e0 [ 852.671860][ T3184] ? do_sys_open+0x31d/0x5d0 [ 852.676460][ T3184] tomoyo_file_ioctl+0x23/0x30 [ 852.681237][ T3184] security_file_ioctl+0x77/0xc0 [ 852.686186][ T3184] ksys_ioctl+0x57/0xd0 [ 852.690345][ T3184] __x64_sys_ioctl+0x73/0xb0 [ 852.694945][ T3184] do_syscall_64+0xfa/0x760 [ 852.699459][ T3184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.705352][ T3184] RIP: 0033:0x459697 [ 852.709267][ T3184] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 852.728879][ T3184] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 852.737295][ T3184] RAX: ffffffffffffffda RBX: 00007f959e2f56d4 RCX: 0000000000459697 04:51:44 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:44 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 852.745279][ T3184] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 852.753272][ T3184] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 852.761243][ T3184] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 852.769237][ T3184] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 852.779534][ T3184] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:45 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x22) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0xd004, 0x10000}) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000100)={0x6, 0xff, 0x80000001, 0xff}) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0xb}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'bridge0\x00', {0x2, 0x4e21, @rand_addr=0x9}}) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xd171) 04:51:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:45 executing program 4 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:45 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4004556b) 04:51:45 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 853.077059][ T3571] FAULT_INJECTION: forcing a failure. [ 853.077059][ T3571] name failslab, interval 1, probability 0, space 0, times 0 [ 853.123789][ T3571] CPU: 1 PID: 3571 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 853.132857][ T3571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.142910][ T3571] Call Trace: [ 853.146212][ T3571] dump_stack+0x172/0x1f0 [ 853.150560][ T3571] should_fail.cold+0xa/0x15 [ 853.155156][ T3571] ? fault_create_debugfs_attr+0x180/0x180 [ 853.160974][ T3571] ? ___might_sleep+0x163/0x280 [ 853.165831][ T3571] __should_failslab+0x121/0x190 [ 853.170775][ T3571] should_failslab+0x9/0x14 [ 853.175279][ T3571] __kmalloc+0x2e0/0x770 [ 853.179528][ T3571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.185786][ T3571] ? d_absolute_path+0x11b/0x170 [ 853.190730][ T3571] ? __d_path+0x140/0x140 [ 853.195063][ T3571] ? tomoyo_encode2.part.0+0xf5/0x400 [ 853.200438][ T3571] tomoyo_encode2.part.0+0xf5/0x400 [ 853.205648][ T3571] tomoyo_encode+0x2b/0x50 [ 853.210065][ T3571] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 853.215714][ T3571] tomoyo_path_number_perm+0x1dd/0x520 [ 853.215725][ T3571] ? tomoyo_path_number_perm+0x193/0x520 [ 853.215738][ T3571] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 853.215758][ T3571] ? __kasan_check_read+0x11/0x20 [ 853.215776][ T3571] ? __kasan_check_read+0x11/0x20 [ 853.215801][ T3571] ? __fget+0x384/0x560 [ 853.215820][ T3571] ? ksys_dup3+0x3e0/0x3e0 [ 853.251246][ T3571] ? do_sys_open+0x31d/0x5d0 [ 853.255840][ T3571] tomoyo_file_ioctl+0x23/0x30 [ 853.260614][ T3571] security_file_ioctl+0x77/0xc0 [ 853.265563][ T3571] ksys_ioctl+0x57/0xd0 [ 853.269727][ T3571] __x64_sys_ioctl+0x73/0xb0 [ 853.274332][ T3571] do_syscall_64+0xfa/0x760 [ 853.278846][ T3571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.284740][ T3571] RIP: 0033:0x459697 [ 853.288643][ T3571] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 853.308257][ T3571] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 853.316679][ T3571] RAX: ffffffffffffffda RBX: 00007f959e2f56d4 RCX: 0000000000459697 04:51:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4004556d) 04:51:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1b, 0x100000000007d) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) [ 853.324654][ T3571] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 853.332624][ T3571] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 853.340594][ T3571] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 853.348566][ T3571] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4004556e) 04:51:45 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 853.438217][ T3571] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:45 executing program 4 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc805000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xe07c, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xffffffffffffff81, 0x2400) 04:51:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40049409) 04:51:45 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 853.696921][ T3927] FAULT_INJECTION: forcing a failure. [ 853.696921][ T3927] name failslab, interval 1, probability 0, space 0, times 0 [ 853.793879][ T3927] CPU: 1 PID: 3927 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 853.802942][ T3927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.813016][ T3927] Call Trace: [ 853.816322][ T3927] dump_stack+0x172/0x1f0 [ 853.820670][ T3927] should_fail.cold+0xa/0x15 [ 853.825291][ T3927] ? fault_create_debugfs_attr+0x180/0x180 [ 853.831122][ T3927] ? __kasan_check_read+0x11/0x20 [ 853.836185][ T3927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 853.836202][ T3927] ? ___might_sleep+0x163/0x280 [ 853.836225][ T3927] __should_failslab+0x121/0x190 [ 853.852427][ T3927] should_failslab+0x9/0x14 [ 853.856948][ T3927] __kmalloc+0x2e0/0x770 [ 853.861198][ T3927] ? mark_held_locks+0xf0/0xf0 [ 853.861212][ T3927] ? __kasan_check_read+0x11/0x20 [ 853.861229][ T3927] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 853.861245][ T3927] tomoyo_realpath_from_path+0xcd/0x7b0 [ 853.861258][ T3927] ? tomoyo_path_number_perm+0x193/0x520 [ 853.861275][ T3927] tomoyo_path_number_perm+0x1dd/0x520 [ 853.861285][ T3927] ? tomoyo_path_number_perm+0x193/0x520 [ 853.861300][ T3927] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 853.861312][ T3927] ? free_obj_work+0x8d0/0x8d0 [ 853.861331][ T3927] ? __kasan_check_read+0x11/0x20 [ 853.861355][ T3927] ? __fget+0x384/0x560 [ 853.876849][ T3927] ? ksys_dup3+0x3e0/0x3e0 [ 853.899083][ T3927] tomoyo_file_ioctl+0x23/0x30 [ 853.899101][ T3927] security_file_ioctl+0x77/0xc0 [ 853.899117][ T3927] ksys_ioctl+0x57/0xd0 [ 853.899132][ T3927] __x64_sys_ioctl+0x73/0xb0 [ 853.899153][ T3927] do_syscall_64+0xfa/0x760 [ 853.914747][ T3927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 853.914771][ T3927] RIP: 0033:0x459697 [ 853.923310][ T3927] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 853.923329][ T3927] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 853.923342][ T3927] RAX: ffffffffffffffda RBX: 00007f959e2f56d4 RCX: 0000000000459697 04:51:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x21, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4008556c) 04:51:46 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 853.923353][ T3927] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 853.923369][ T3927] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 853.999897][ T3927] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 853.999906][ T3927] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 [ 854.019482][ T3927] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:46 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:46 executing program 4 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x8001, 0x640) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x800100a, 0x8}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x40086602) 04:51:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 854.231331][ T4157] FAULT_INJECTION: forcing a failure. [ 854.231331][ T4157] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 854.244671][ T4157] CPU: 0 PID: 4157 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 854.253687][ T4157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.263740][ T4157] Call Trace: [ 854.263770][ T4157] dump_stack+0x172/0x1f0 [ 854.263799][ T4157] should_fail.cold+0xa/0x15 [ 854.275963][ T4157] ? fault_create_debugfs_attr+0x180/0x180 [ 854.281778][ T4157] ? __kasan_check_read+0x11/0x20 [ 854.286813][ T4157] should_fail_alloc_page+0x50/0x60 [ 854.292014][ T4157] __alloc_pages_nodemask+0x1a1/0x900 [ 854.292031][ T4157] ? __alloc_pages_slowpath+0x2520/0x2520 [ 854.292048][ T4157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 854.292071][ T4157] ? fault_create_debugfs_attr+0x180/0x180 [ 854.315155][ T4157] ? __kasan_check_read+0x11/0x20 [ 854.320175][ T4157] cache_grow_begin+0x90/0xd20 [ 854.324941][ T4157] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 854.331180][ T4157] __kmalloc+0x6b2/0x770 [ 854.335429][ T4157] ? mark_held_locks+0xf0/0xf0 [ 854.340193][ T4157] ? __kasan_check_read+0x11/0x20 [ 854.340218][ T4157] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 854.350952][ T4157] tomoyo_realpath_from_path+0xcd/0x7b0 [ 854.356507][ T4157] ? tomoyo_path_number_perm+0x193/0x520 [ 854.362148][ T4157] tomoyo_path_number_perm+0x1dd/0x520 [ 854.367616][ T4157] ? tomoyo_path_number_perm+0x193/0x520 [ 854.373279][ T4157] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 854.379091][ T4157] ? free_obj_work+0x8d0/0x8d0 [ 854.383862][ T4157] ? __kasan_check_read+0x11/0x20 [ 854.383890][ T4157] ? __fget+0x384/0x560 [ 854.383909][ T4157] ? ksys_dup3+0x3e0/0x3e0 [ 854.393069][ T4157] tomoyo_file_ioctl+0x23/0x30 [ 854.393087][ T4157] security_file_ioctl+0x77/0xc0 [ 854.393104][ T4157] ksys_ioctl+0x57/0xd0 [ 854.393122][ T4157] __x64_sys_ioctl+0x73/0xb0 [ 854.402289][ T4157] do_syscall_64+0xfa/0x760 [ 854.402309][ T4157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 854.402326][ T4157] RIP: 0033:0x459697 [ 854.430370][ T4157] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 854.449978][ T4157] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 854.458392][ T4157] RAX: ffffffffffffffda RBX: 00007f959e2f56d4 RCX: 0000000000459697 [ 854.466360][ T4157] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 854.474338][ T4157] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a 04:51:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:46 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x400c55cb) [ 854.482485][ T4157] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 854.490455][ T4157] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6572726f72733d636f7d74696e75cb4ff00e652c00"]) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x100) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x28100002}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x180, r1, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x55}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x66}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xde}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7, @loopback, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x4, @empty, 0xff}}}}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x40080}, 0x8001) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000180)) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1e1e, 0x109000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000300)={0x4}) 04:51:46 executing program 4 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:46 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4020940d) 04:51:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x225c17d03, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:47 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:47 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2e000, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) fstat(r0, &(0x7f0000000100)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x4040534e) [ 854.904546][ T4585] FAULT_INJECTION: forcing a failure. [ 854.904546][ T4585] name failslab, interval 1, probability 0, space 0, times 0 [ 855.004974][ T4585] CPU: 0 PID: 4585 Comm: syz-executor.4 Not tainted 5.3.0-rc1-next-20190726 #53 [ 855.014042][ T4585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.024102][ T4585] Call Trace: [ 855.027410][ T4585] dump_stack+0x172/0x1f0 [ 855.031758][ T4585] should_fail.cold+0xa/0x15 [ 855.036369][ T4585] ? fault_create_debugfs_attr+0x180/0x180 [ 855.042185][ T4585] ? ___might_sleep+0x163/0x280 [ 855.047038][ T4585] __should_failslab+0x121/0x190 [ 855.051979][ T4585] should_failslab+0x9/0x14 [ 855.056483][ T4585] __kmalloc+0x2e0/0x770 [ 855.060735][ T4585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 855.066978][ T4585] ? d_absolute_path+0x11b/0x170 [ 855.071920][ T4585] ? __d_path+0x140/0x140 [ 855.076262][ T4585] ? tomoyo_encode2.part.0+0xf5/0x400 [ 855.081639][ T4585] tomoyo_encode2.part.0+0xf5/0x400 [ 855.086838][ T4585] tomoyo_encode+0x2b/0x50 [ 855.091262][ T4585] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 855.096901][ T4585] tomoyo_path_number_perm+0x1dd/0x520 [ 855.102362][ T4585] ? tomoyo_path_number_perm+0x193/0x520 [ 855.107998][ T4585] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 855.113800][ T4585] ? free_obj_work+0x8d0/0x8d0 [ 855.113821][ T4585] ? __kasan_check_read+0x11/0x20 [ 855.113848][ T4585] ? __fget+0x384/0x560 [ 855.127752][ T4585] ? ksys_dup3+0x3e0/0x3e0 [ 855.132179][ T4585] tomoyo_file_ioctl+0x23/0x30 [ 855.136949][ T4585] security_file_ioctl+0x77/0xc0 [ 855.141887][ T4585] ksys_ioctl+0x57/0xd0 [ 855.146039][ T4585] __x64_sys_ioctl+0x73/0xb0 [ 855.150635][ T4585] do_syscall_64+0xfa/0x760 [ 855.155150][ T4585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.161042][ T4585] RIP: 0033:0x459697 [ 855.164941][ T4585] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 855.184547][ T4585] RSP: 002b:00007f959e2f4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 855.193662][ T4585] RAX: ffffffffffffffda RBX: 00007f959e2f56d4 RCX: 0000000000459697 04:51:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1000, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000002340)="31dd74d221fb661d5ad34d4b9c374d6af21eef38f42588723a709ae2a3e371fe08dec89b98956d1c73f0b71cc032a7f1691ad01dddd83f36804860e3a2f13c78ea105e1ea9626b9bc56207b32ae36d7a62911d0dc5f9a26d3d8f28190129a16b9c7cbc8c87b3382982d3cda65e7377ef0054cccbf772212ac5f05b89ee152a875c7c9b914aa6496d3d8ab76da0e3107c77656e2b82a85e2eb702ded3b7b7fed59f9383f999de2c18d02a503448074468a79d535a0d94dd4933015e2619a515f7e04602a609ec5832aa086b81637382cb2c80e77c86429cdf7462005cafa0908fb37996c99a3ea02d1794bfb0e2d370112dd857bd5a1d0faba50701a46c06f3147a329abc160888433ea2317b29d670e85a73e1d40bdf98de6625f1da18a9945c2bc3ece131c9d614939ea75fe23c79eaa6b3ad144d8ac01918504d9998f1adb8e6ce38384f09323d588309a2a0b57df21e1588fc1562819a334cfd6fcb2a54a94e6bfe5834fd8304b9754a736290fa03b29028fd86e842456a6f2f0d8c78fa9e54f45e105c2330d501dd87ad7c97d4b7fc8c3c0ae12013e8c0d89477d0bb4a7ec2745e22479c5fdc7a0af81d1b14cf3080e7d19e9537a4a88c7d485dc8f499fd1ff4e427ff5c975da471a2efb5706141a4a63897acc33d4cc3802a1d5dcd2f77566729ca3e6ee79a867ca8e86fbc494ba2b6f19800b8b155866fb4ba586d7f24e2f5591eb84dc5f884ef17e0c249b7ac2da36cdd8e708b24b0d0614840533628f015f00e3444184409a5a5e888033abce1c663e03774f04bd83ac9c6cb58bbaac60562c72aace98fac4801e5913d67f0217d62fec13b590f6e6f159f413da7afcf93e8a9f87b7fdb6d80989aa7189447c73ea4f37dbd70be755457ee57d38f03e17a2cc193f405b535218cef3f336a63b925113be89c59b01d61c1299fb810bec75aabe56c4cbbd94ac88cbf5a3d35ad10e081241be9099c6ba223f947bc7f6bac3d735951ce61267b5a23a6d040e49952ecbfdc9a21875d4d00fb9105e0f7bdbd3f38833df5307bd77aedcb006d4aa6ddc593ac739c9d9f9d655060a06e91e9df26b08b762dd08180d6a3fcc19dd527c1364f66b29596f8fae3153185d84197f22f4975c9e6a3352d1b52c5bbc31f63a8d8927651d0248ca60a0155881892ee367890fd1ed7a207e097eaab9a3b6ae8821ec2bde439578e96aeed6eeb8551e223bb397807497f98b1a0eb3e75b2260123b067f389915ae5015e5bb0433b75c00ab31fd5bd54d1045d1cb43a2ad1bd35b68f8f7a4c530d1d0583bb24e1edec5031f25d61441bdab134260462de1daa2ed45057c148ede7ee25483857e9afe684190f38b6229eedc311b616868a41c032fcd43bfa419313cc95ab67b01ecbdf398db0fc1cffcbf6883ad5ad7728d997f34afa4919a351def1536bf2be864bec0d1a3be7db48d27817a995836c756f9e12d0b1c446c31ad55dfec8346cf15a9af51ca65e4fc349f33a699dd3caa1e71ae63e2bc6f638063266b65738af92ea3a76cbd2a3d0e4396baa094ff27111d26435a4271091b6cf2c28779451431919604cdedc3c7b0aaa32dc7dad8fb0b8a2317f858f98c7e8926e2f6813e82b92acda171713bf9c38a1d5648ba647e3b37ef857876e94564aad9fa93e26e37f93e57b843a1956b92635e2ba6607684d6248dd0dcd94f01e9d9e2a48214ac6459f86cc7ac1bcfa4f3dc8c9556fbee2df6f7ef6aec2bd02b673935c631869a56e591945a1ad2896ceef474849ed219aa7e4882e995e9febe5b9597c13e9fbfe4c2f38985f4ef6e0b6665e2b29b9df2b4dfbbcf9fced9c6002c4526ee4bacc8fca29f5db4a50440a1614244151b7226e05add5f4ede1dc83f8704aa6413b642ed8ab98a4d82577ae04ec698209e1a422391ddd91183b5f7e166c81d8090f59b093dfa3bb435b55b286bf8751acff1b9113e0ee4122832d42ef11a1a22dbf93de1489f93a24aecf0561ae8bc89b4abbd8a3efb11083efa989116c5c2d7c6e8dfbd0fc466c2ecf176bb22decb57f4129d27dbbfdcefea2fdd63bf37dc47968547553d2b42a01c8070cf7681c36dce90d893cf7c688ef2a29b083e197aecab3cb6e261be53f0162e293c00a4597b97fcca4cf3f174efc313ca2e222fc644ecca8467c94d0d9608bbc013000930bb13aee5edd69da676cafa6b729a44d4d5071f23614fde240130b255282a1b215809bd053190ce927d71f8b3f4ca928f1d6fc1ed28dd08d0e829dddf983c366d3e116e8db57b2428cefd36f905156ca5ad575d362a98509eaac54223ac7e8e599829f92c625027db68bf4209b76a194e450753487836d7be35dc9e17c053805dc0bca935e80fca3df785075c53d68e0f27ef3836a6b8e2a28db55927a6e4ad80736cc60fe0da2617b1156dfa822825a152d14926cec971b49acdade78e1e5265a4227f7042ef60433b09161cef58ad74b9fefd1391be8d2dda002eac5e924b6fb3971fbaf22a5143cc66ff638de6da9efd6e0634c37b5ba9b891588f6c81704b7cb5535f6a8c472dda6f47bda9ece2adc2cfb0033fd6336542829a9f6f4f16da2bd0e54d2a693f39103d00edbc615fd152eea403eac32518bd400b5592e93f272def897c6b616ff266d2188c3b2dc4079bcdd14350b904aa1dbe5b326f7b081f313b5a0215e667f06d748b425ff1957ca534f2e5def1adec806d0ff36af9be2e69b72e33935586268c53a4cd9ec50df461770f96b0919a07b05effe7ab1a7eaead32216bd88482042633ad4a9e7f023e117907cf3ddb15ea5d766096667a9d3071448a6a54ddad83ecdda1dcd8a8287531ad5060c8e283029e27f96c27d805272965ac87528cdf856cd498cfb3246513369c66dcbab6911420bdedba866cb232930ffb3e0073484b93e86ecc3e946db7e1f1fcb88c95cef73a5ad017343bb0406c539843c2bc4eb257f52da2cd78b9f3856887d7aee8bd3f5f3e564cee60badb795fa8e0f7dc4814dbc11a2987b2bf8413f873e145b86ef60b12922b9c345e7f1b3aa3bf19fe5f7b650829cddcb45fed26406ebb51e41a79212fd9b37c6b12fd86524a24869d841b6e7920f4be0d88cb9e3ba45710ac267e406a333cf9d5323c05d004c511e4ca6904e758050d07b01bf60a785bf429133cc9686759b91cd89a580aa56a1f65b68ea9af7017f08fc8d247c48d02913c9be3607ae5723068f5f931ead3486083108a9795844d42a5d72d0651ac5330452f5d4ab60c4fa460b4d88ffcac57a6d0de42299eb86fd2bc1e0503ec36c9f77237e30931cffcda810a01ea51624f97fcd90a005077cf6fd1a07a3f697729f25fea18b286917c3518e86d9a95137a01f02c89964e91e433c8ffb8398f847c6c538600a6344076baf80e2c397747ee7d9cd6395552c04c187ee2114ecb4de3955d63a20e0fa7891ce39e8bbe0b8d8924912d2aa6320d9624dc4c75dc2a6624e7abb6416b79deb3dded34a6ab17b80fb870ae8d4068f66e5acdecde09e723657e268ed8275029b7701516e157501c8e425c1980b154aab74b4e897dcf4af0745bbd5246eba992eb11aeae32896608205827631847053884473e5d5760418183ea0a9ad0d9878d2f67b154846f37bd74d7c2494590e8009abea69ec65187bbea32ccbb2bc89a252eea6fec8f598e469ba7a50614b0bb1ea89503063baf4ab22b221aff772209bc9f9774f8d9dfebe0d9a6d1e546fd5b4644a0aa3c1f0a0161de3093145d3773f92850e60b92c834cd94ffa49f19e904f08f1b28bfe01e362fd4743c841094256a0477c8cf5e64e71f10afd41fbb972ba274f1d6e713e435e33c61e1c07c690c7efbf6dfa7c5c5851b6e013fb09202859356768d7148af2f08fdb82766a99fd2948292a94cf818bd963d63dda1f3e0412df67bcff23d31b60b7e625cd53aa09b0817225e4c0fd0096f7711efd8c0b01c9e40e8aa6a3c6e3dbd18dc7e95a3727a423259796a633775069368a4639fc8318c9a2717cd5a9ed793b19dfb0f02adf841b9b78740f6d0f6e1db5fe94b54cb48b225aeb3323453e680e7d83388768f962d4f018afc4826728322be4295870cb656ff457ea20f3b8c3f211ed62f300d099aeab55572bc1ba65918bf0ee54debffe3cbd47efb1f7eff0ec5072787a85bb901db00153aaa418075c7c14d3694610bf4d9d628330eb7ec11117089fcc23228a7e78dea4471b907bfe53c8e6b66bb0af0b2c4f697e15549f177b1973056c6530c5e5e84a9babff70d768a9e60bc0c601ead0174ca8bc356912b9ac77fbff387ca3aea0a5ba048cf3f300f8f877b6cbe213ce36ed4283a363e5722c821443a9ed06c3e1d511554163d75897b0bd61c68d89cf04647644a5ada84c9f78c8aefe1f90caf4e0914aaab55d61db77bb06758bf8d0831051031d16b4d98a220370e5e23c3c45ce5cb9a6c06e90f3b5bdf7bc81a647d6ee26c89a8067d2d49137f1e99d5beb0aa030146f8f106f3581bb0180d945991442bd433d7808be56a2aadd8112ece3bc10e449dc59aa66a1d4c38536a5196ee1650d9e4f3bba7e2c0b4689e2dab8c4edf0212eaa8b5c7e355d0fa2d887d5881ba094e731ae5e07840eba2eab4335198d089502612eee11c50a1296bc6d217771e74c7e0efcb71b31ebf04e166749675c0c33f62e277410faa8316dba60ccc01c11e3fd63c0ba111dffbf087ebba181c9b3499ad55944f96d35a33d9ddf546f9af65f0446d13f5acf024abb8a0fb7b463d3e6011e0983e526bfb6ccc1de864dc917b4adab619c832e2f21c5b6f7fd1eb4440d529a1488d3d7162e0439c9f1c6e3e9943f95774e36794eede49bdfa73edd7c219d1904b7f2180d8eba0ab240cd67df491e8daba9f01f26ac9b869c74bd0d23b0ccb25a2d07520cee5f68a36cd816e05522b2ead72e9f283dbce80a95311ea5e775c681669ea7847c11ee51cf10ae0de3d9f19d9c49e1285ddf3c86322be046614e4cc3394ef5d9ec792ce7007c083e0085f24d7e618a3f90cd26da1e23ca1b8b64866a79ccef9a32010e6304aceb8df8b1b83f3e7cb0c7cc53f838d8aa64632d7478611382f7d36b6fb889e7f1ea48c89e3aedd55d6d73a2096d62c53dba35a25e741d39e940dbc211bd75dfcf000c901b6b30c2305d21beee49648c26f2831c40a09e62957ca6e6eca7cac6340bf6c8b1b58086b455ec5ad8f2408cd39bf43ed6a36dd0e6e637afb47225afaba254c1c64bc150576ae1bc8dd99b7c34aef929f4d3eb0c8567db2c22277e6cf8ce5f27cde36634b82a567dd441a5e0b2a67399fbe3217bcae35c20f93e8e516b20456e81f62e543a30df7666af4a3dd9b0df215369020cd2cb9d2adeb98120476e9d8a9ec7558190f1a0b66e8c19cabd8cec88ddde9db420354dc5c67240490088d8b9dba041e8a5d8352414dcc628f29c0dbca33c14bd73d9bf69a4dbcec0f44bf84a5e22d6699890b10116b2eda374fa7f4a29cc29ff9a687f0a5e768eda362406b4b05a2c386ad4302ad97806dd3cdc3303be42df41bcd88e8f794f1525a838d6807f015aaf80943baf65a8494b90e755919d0bfa79f4eaf929f7b746af27c9fbf884a7e3c7a0e831f23ac32ad9137f8855dfcfcfa6761620ad7d6b60e8454c62a6d455706e3bb489a0e319259c213ddcb1c1e26b3a0bcf595bb69e336cc39b3bb22f733157f419d041bcd9e5cc2fe841e38786ae206c48bf9a8018ef17a5b9f9fdaffe13f22bf97739b07a2d3f2e6b1e693cf9f55cd49ce0ff1f12f8f1e19de20f3ac7b5cb5448720aadd0", 0x1000}, {&(0x7f0000000040)="a6704e805d06e0902a55471266abd6d6ff80e7ae40d95d9f9c379ea52b0ef9a13bac4797225b255e717d2b2efeb369abb2fa043d774b8b89daf84d313995b1a552af6b3b1ad4f827050632383d7db2c8cad5e4bbfd815cf183a4e288b127c0890c654bf9e114dd", 0x67}], 0x4, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:47 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 855.201639][ T4585] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 855.209612][ T4585] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 855.217582][ T4585] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 855.225552][ T4585] R13: 00000000004c8938 R14: 00000000004df710 R15: 0000000000000003 04:51:47 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 855.309806][ T4585] ERROR: Out of memory at tomoyo_realpath_from_path. 04:51:47 executing program 4 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:47 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:47 executing program 2: r0 = socket(0x3, 0x80007, 0x4) r1 = accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10, 0x80000) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000100)=""/163, 0xa3}], 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000001c0)={0x0, @speck128}) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x7f, 0x400000) 04:51:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x405c5503) 04:51:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101002, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x1}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x4}, &(0x7f0000000140)=0x8) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:47 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:47 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x406855c9) 04:51:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:47 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:47 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x80045439) 04:51:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x2, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:48 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:48 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x800454d2) 04:51:48 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1ff, 0x10000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000001c0)={{0x3, 0x3, 0x8, 0x0, 0x9}}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000080)='teql0\x00') 04:51:48 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x8004552d) 04:51:48 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x80086301) 04:51:48 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:48 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x80000000, 0xfffffffffffffffe) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc0045878) 04:51:48 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:48 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) fcntl$dupfd(r0, 0x406, r0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7d, 0x8000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6d8c13d70578f1ad, 0x40) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000080)={0x6}) 04:51:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc0045878) 04:51:49 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:49 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:49 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x7}) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 04:51:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x5, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x37dc12502000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:49 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc00c55ca) 04:51:49 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:49 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:49 executing program 2: r0 = dup(0xffffffffffffffff) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x11, 0xff, 0xb, 0x24, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_ident={0x2, 0xb, 0x93, 0x0, 0x4}, @sadb_x_nat_t_type={0x1, 0x14, 0xfffffffffffffffb}, @sadb_x_sa2={0x2, 0x13, 0x3f, 0x0, 0x0, 0x70bd29}, @sadb_x_sec_ctx={0x3, 0x18, 0x2, 0xaa42, 0xd, "f15bd1ff46b79ad1e21954311d"}, @sadb_key={0x10, 0x8, 0x3b0, 0x0, "97509c133b98536d0343e19c99243f5cf290a40ee504a556975883a6bac022b8521e04dadb8bb50da846d83bcbde81b4d7f2089d3a7e7741eaf4777415a7a5115a12e2e8c83a02646079c379dc27a7b82c302314ad875d32f3c0c5320673a2da1405e96a131465ee21e2b12d4c81b201e36bccb06bb8"}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d4}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e22, 0x400, @mcast1, 0x88}, @in6={0xa, 0x4e22, 0x8000, @mcast2, 0x3b}}]}, 0x120}}, 0x800) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000240)={0x1f, {{0xa, 0x4e21, 0x5, @mcast2, 0x709}}}, 0x88) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x8000}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000380)={r3, 0x8}, 0x8) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x6, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc0145608) 04:51:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:49 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:49 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc0185879) 04:51:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:49 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:49 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x42202) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x0, 0x5, 0x8, 0x101, 0xe, 0x1, 0x2, 0xffffffff, 0xfc, 0x1ff}) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x7, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:49 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:49 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc0189436) 04:51:50 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x8, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:50 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:50 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = dup3(r0, r0, 0x80000) epoll_pwait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x1889, &(0x7f0000000040)={0x5}, 0x8) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x3314, 0x5}, 'port1\x00', 0x8, 0x100000, 0xce7, 0x800, 0x9, 0x3ff, 0x9, 0x0, 0x2, 0x2}) 04:51:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc020660b) 04:51:50 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:50 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:50 executing program 2: ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x7}) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='\x00'/13, 0x0, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000340)) 04:51:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x300, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0xc06855c8) 04:51:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:50 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:50 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:50 executing program 2: socket$inet(0x2, 0x6, 0x4) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1f, 0x80001) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)={0x6, 0xfff, 0x2ad3, 0x9, 0x0, 0xd63}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000100), &(0x7f0000000140)=0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f0000000440)={0x90, 0x0, 0x7, {0x6, 0x1, 0x6, 0x9547, 0x8c, 0xfffffffffffffff8, {0x3, 0x624b25f1, 0xcb7d, 0x2, 0x6, 0x7af74890, 0x401, 0x1, 0x9000000, 0x1f, 0xabb, r2, r4, 0x7fff, 0x5}}}, 0x90) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000340)={0x1bff96ef}) r5 = getgid() ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000280)) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000240)) write$FUSE_ENTRY(r1, &(0x7f0000000180)={0x90, 0x0, 0x1, {0x5, 0x0, 0x9, 0x10001, 0x3, 0x2ed7, {0x0, 0x6, 0x3ff, 0x1f, 0x7, 0x2, 0xaf1, 0x80, 0x4, 0x90, 0x8, r3, r5, 0x45a, 0x7fff}}}, 0x90) 04:51:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socket$caif_seqpacket(0x25, 0x5, 0x1) 04:51:50 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:50 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x500, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 858.731812][ T7863] input: syz0 as /devices/virtual/input/input984 04:51:50 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:50 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) 04:51:51 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000100)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000140)=r2) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x38) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000040)={0x8, 0x8}) r4 = dup(r0) write$uinput_user_dev(r4, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) mkdirat(r3, &(0x7f0000000180)='./file0\x00', 0x20) fcntl$dupfd(r0, 0x0, r0) write$cgroup_int(r4, &(0x7f0000000000)=0x81, 0x12) 04:51:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:51 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x600, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:51 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x58e) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:51 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:51 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 859.167471][ T8138] input: syz0 as /devices/virtual/input/input986 04:51:51 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = getpid() timer_create(0x5, &(0x7f0000000040)={0x0, 0x3b, 0x2, @tid=r1}, &(0x7f0000000080)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x700, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:51 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:51 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x420001, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x2}) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000140)) 04:51:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:51 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 859.583957][ T8577] input: syz0 as /devices/virtual/input/input988 04:51:51 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0x2) splice(r0, &(0x7f00000000c0), r1, &(0x7f0000000100), 0xea23, 0x2) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3f00, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8cf0, 0x210000) fstatfs(r0, &(0x7f0000000080)=""/210) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000180)=""/87) 04:51:51 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:52 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) [ 859.964251][ T8908] input: syz0 as /devices/virtual/input/input990 [ 860.058872][ T9082] input: syz0 as /devices/virtual/input/input991 04:51:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1f, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x20000) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000180)="baf80c66b8de79898666efbafc0cb00eeeb800008ee0b8ff0f8ed8f3ad0f01c2f23ef0876572ba4000b80f00ef2edc4759660f3802790066b9800000c00f326635000400000f30", 0x47}], 0x1, 0x18, &(0x7f00000000c0), 0x0) r2 = request_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000340)=""/167, 0xa7) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000200)={0x800, 0xfffffffffffffffe}) read(r0, &(0x7f00000000c0)=""/20, 0x14) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000100)={0x6, 0x51f9}) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0x10, 0x10000}) 04:51:52 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:52 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = open(&(0x7f0000000100)='./file0\x00', 0x20000, 0x20) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000e00)="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") r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) move_mount(r2, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0x5, 0x5, 0x2b9}) 04:51:52 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}], 0x1, 0x0) [ 860.328390][ T9241] input: syz0 as /devices/virtual/input/input992 04:51:52 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 860.416337][ T9379] input: syz0 as /devices/virtual/input/input993 04:51:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x400000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x23, 0x140ffe) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0x4c, {0x7, 0x3, 0x5, 0x9, 0xa8e, 0xf5}}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:52 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:52 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:52 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8200) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000100)=@dstopts={0x0, 0x18, [], [@calipso={0x7, 0x40, {0x77, 0xe, 0x7, 0x1, [0xff, 0x4, 0xfffffffffffffff8, 0x9, 0x3, 0xdda, 0x5]}}, @ra, @calipso={0x7, 0x20, {0x1000, 0x6, 0x20, 0x4, [0x6, 0x80000001, 0xb227]}}, @generic={0x5, 0x38, "7565a67714214f783884764f6787915382f4a6efa860204ba98936e4cedbf235dc013d08643c0cbbb3f492d91acedf7c5283b36c0cc5b2c2"}, @hao={0xc9, 0x10, @rand_addr="e881e981f48b2d2a55a2fd987dac984f"}, @calipso={0x7, 0x10, {0xffffffff7fffffff, 0x2, 0x2, 0x7, [0x5]}}]}, 0xd0) 04:51:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 860.843936][ T9757] input: syz0 as /devices/virtual/input/input994 04:51:52 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}}, 0x1c, 0x0}], 0x1, 0x0) [ 860.890763][ T9789] input: syz0 as /devices/virtual/input/input995 04:51:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) tee(r1, r1, 0x7, 0x2) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x800, 0x7}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000100)=r2, 0x4) ioctl$UI_DEV_CREATE(r0, 0x5501) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xfffffffffffffffc, 0x2, 0x40, 0x272}, {0x8000, 0x3, 0x5, 0x7}, {0x7fffffff, 0x3, 0x20, 0xfffffffffffffffd}, {0x8001, 0x8, 0x4, 0xffffffffffff566b}, {0x0, 0x310, 0x3f, 0x5}, {0x3ff, 0x0, 0x3, 0x9}, {0x1ff, 0x2, 0x1000, 0x4c1b}, {0x2, 0x101, 0x101, 0x1000}]}, 0x10) 04:51:53 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:53 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 861.231914][T10167] input: syz0 as /devices/virtual/input/input996 04:51:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 861.285264][T10167] input: syz0 as /devices/virtual/input/input997 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:53 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) bind$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x1, 0x5, 0x7, 0x0, "5602f636da94f33e369aded7368c2dd4874a4cfc9bb70ce41fbc6c7be4e91690b092f4890cc408d5f1315b08052ee150fffd816d653f76002bc75bbf133318", 0x2c}, 0x60) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000100)={@empty, 0x0}, &(0x7f0000000140)=0x14) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)={0x3, 0x4, 0x1000, {r4, r5/1000+30000}, {0x0, 0x2710}, {0x3, 0x101, 0x3, 0x5}, 0x1, @canfd={{0x2, 0x9, 0x7, 0x7d5}, 0x12, 0x1, 0x0, 0x0, "249effcb2823485103703802f308fa10420afa12e489dc62d2f57b5ba02822854b7168ed63898766e5b9032174f525d8fe7c3192fc4d83669440d0abd6511108"}}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x8001) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) 04:51:53 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) [ 861.517761][T10484] input: syz0 as /devices/virtual/input/input998 04:51:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:53 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xffffffff80000000) r2 = dup(r1) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:53 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x301]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:53 executing program 2: lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='..ppp1\\@\x00', 0x9, 0x3) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:54 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:54 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) 04:51:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:54 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)={0x7}) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x80000000, 0x10240) [ 862.202379][T10916] input: syz0 as /devices/virtual/input/input1002 04:51:54 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) [ 862.276969][T10916] input: syz0 as /devices/virtual/input/input1003 04:51:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x5000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:54 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0xc401, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) recvfrom$llc(r1, &(0x7f0000000100)=""/104, 0x68, 0x2000, &(0x7f0000000180)={0x1a, 0x337, 0x7000000000000000, 0x1, 0x1, 0x7ff, @remote}, 0x10) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7003, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x7}) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "92288c198f930e4b6f00030475b9692b37f67c8c"}, 0x15, 0x2) 04:51:54 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x5, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 862.570684][T11283] input: syz0 as /devices/virtual/input/input1004 04:51:54 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x6000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:54 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = gettid() ptrace(0x4208, r1) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x6, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:54 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:55 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x800020, 0x8000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x102, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000100)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) userfaultfd(0x80000) [ 862.936347][T11513] input: syz0 as /devices/virtual/input/input1006 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x7, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = socket$inet6(0xa, 0x4, 0x3) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x20000004) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000100)={r4, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240), 0x4) 04:51:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x7000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:55 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:55 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000040)={0x7}) [ 863.208821][T11738] input: syz0 as /devices/virtual/input/input1008 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:55 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x8, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x8000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 863.353651][T11696] input: syz0 as /devices/virtual/input/input1009 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:55 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x580, 0x0) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x2}}, 0x18) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) ptrace$peekuser(0x3, r2, 0x531c) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) r3 = dup(r1) write$uinput_user_dev(r3, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:51:55 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:55 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x200001) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x80000) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001580), 0x10, 0x80800) r2 = accept4(r1, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x44, 0x807fd) sendto$netrom(r2, &(0x7f00000015c0)="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"/4096, 0xfffffffffffffe51, 0x20000000, &(0x7f0000000100)={{0x3, @null, 0x6}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000087000000fcdbdf25110000000800060008000000080006000100000008000400fbffffff080006000900000004000100"], 0x38}, 0x1, 0x0, 0x0, 0x40001}, 0x40) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) recvfrom$netrom(r2, &(0x7f0000001340)=""/183, 0xb7, 0x5afffe9eae88c57e, &(0x7f0000001400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000001480)=""/221) 04:51:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x300, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:55 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 863.737139][T12069] input: syz0 as /devices/virtual/input/input1010 04:51:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x500, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:55 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x48000, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000080)={0xfff}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:55 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000040)=')[ppp0+posix_acl_accessself\x00', 0x1c, 0x2) tee(r0, r0, 0xfff, 0x1) 04:51:56 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400]}}, 0x1c, 0x0}], 0x1, 0x0) [ 863.969240][T12202] input: syz0 as /devices/virtual/input/input1012 04:51:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x600, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:56 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:56 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0xc0000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x111100, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000040)={'broute\x00'}, &(0x7f0000000100)=0x78) r3 = socket(0x2, 0x0, 0x400) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f0000000000)={0x1bc8, 0x1417, 0x3f, 0x2, 0xb7f, 0x3, 0x4, "bf772d733219938170d5b5069054948fac9b11ae", "068cc2a376ac84f3ce838206f91cc3e081eee3d4"}) getsockopt$rose(r3, 0x104, 0x4, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000200)={0x7}) 04:51:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x700, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:56 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 864.244604][T12424] input: syz0 as /devices/virtual/input/input1014 04:51:56 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:56 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x301000, 0x2) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000002c0)={0x5, 0x6, 0xffff, 0x37, &(0x7f0000000180)=""/55, 0xc7, &(0x7f00000001c0)=""/199, 0xb3, &(0x7f0000000340)=""/179}) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x46400, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000440)={'team_slave_1\x00', 0x800}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000100)=0xfff) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000300)={0x7}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0xc201}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea010000000000f109a708f78293c8744e1a", 0x0}, 0x28) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x8955, &(0x7f0000000000)=0x2) r6 = dup2(r3, r4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e23, 0x100000000, @local, 0x7fff}}, 0x1020000000000000, 0x14, 0x8, 0x73, 0x42}, &(0x7f0000000400)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xfffffffffffff001, 0x800, 0x7, 0x95, 0x1, {0x0, @in6={{0xa, 0x4e24, 0x4cbf, @mcast2, 0x6}}, 0x4, 0x80, 0x8, 0x3, 0xf16}}, &(0x7f0000000640)=0xb0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000800)={0x9, 0x552, 0x8001, 0x2, 0xe0, 0x4, 0x2, 0x6, 0x5, 0x8, 0x101}, 0xb) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000680)={r8, 0x7, 0x1f, 0x6, 0x10000, 0x1, 0x1, 0x1, {r9, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0x0, 0x1a, 0xc0, 0x10001}}, &(0x7f0000000740)=0xb0) r10 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x1) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000780)={0x6000000000000, 0x4, 0x4, 0x9, 0x5, 0x1, 0x100000000, 0x4, 0x6, 0x74, 0x5b}, 0xb) ioctl$TCGETX(r10, 0x5432, &(0x7f0000000040)) 04:51:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3f00, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:56 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:56 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}}, 0x1c, 0x0}], 0x1, 0x0) [ 864.592408][T12651] input: syz0 as /devices/virtual/input/input1016 04:51:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:56 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:56 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)={0x7}) prctl$PR_SET_FPEMU(0xa, 0x4000000003) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x10000001c, 0x400000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0xff, 0x8, 0x3884d6c, 0x6, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x100000001}, 0x8) [ 864.798296][T12873] input: syz0 as /devices/virtual/input/input1019 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x400000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x4000000000000003) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r2, 0xfff}, &(0x7f0000000100)=0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 865.097411][T13038] input: syz0 as /devices/virtual/input/input1021 04:51:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "b1b9d6788cdd14afdbc33e4a9e694cddc67600be"}, 0x15, 0x1) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101800) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000100)='vmnet1md5sum)!{]cgroupvmnet0\x00', &(0x7f0000000140)='./file0\x00', r2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x8000000000000003}) 04:51:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x1000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x2000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 865.364109][T13208] input: syz0 as /devices/virtual/input/input1023 04:51:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xffffffffffffffff, 0x410000) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48000040}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x9c, r2, 0x608, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x38}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2809c016}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4048045}, 0x1) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 865.717159][T13410] input: syz0 as /devices/virtual/input/input1025 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 865.788067][T13538] input: syz0 as /devices/virtual/input/input1026 04:51:57 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:57 executing program 2: openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x614c, 0x100) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x401, 0x0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:58 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:58 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 866.032228][T13673] input: syz0 as /devices/virtual/input/input1027 04:51:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x5000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:58 executing program 2: r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x80000) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000200)={0x0, @reserved}) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1f, 0x2) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000140)={0x0, @reserved}) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x8, 0x400) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000100)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000340)={0x9}) 04:51:58 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:58 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x6000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 866.371019][T13899] input: syz0 as /devices/virtual/input/input1029 04:51:58 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:58 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000040)={0x9, "f30302dc3538c98bd8ea3cd3c368a90e316438d83c6eb2f9a21a57f0881c01ec", 0x0, 0xfffffffffffffffc, 0xf69, 0x2, 0x5}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x7}) 04:51:58 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:58 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0xf], [0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x80000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r2 = getpgrp(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x7fff, 0x7fffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r3, 0x3}, &(0x7f0000000140)=0x8) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:51:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x7000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:58 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:58 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1f, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2500, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x600000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000300)={0x3}) 04:51:58 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 866.700940][T14211] input: syz0 as /devices/virtual/input/input1031 04:51:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x225c17d03, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:58 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x10000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) r2 = dup(r1) syz_init_net_socket$rose(0xb, 0x5, 0x0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x3}) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000080)) 04:51:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x8000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:59 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:59 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc805]}}, 0x1c, 0x0}], 0x1, 0x0) 04:51:59 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:51:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 867.113555][T14551] input: syz0 as /devices/virtual/input/input1033 [ 867.151792][T14565] FAULT_INJECTION: forcing a failure. 04:51:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:51:59 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:59 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c, 0x0}], 0x1, 0x0) [ 867.151792][T14565] name failslab, interval 1, probability 0, space 0, times 0 [ 867.215649][T14565] CPU: 1 PID: 14565 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190726 #53 [ 867.224878][T14565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.234933][T14565] Call Trace: [ 867.238236][T14565] dump_stack+0x172/0x1f0 [ 867.242580][T14565] should_fail.cold+0xa/0x15 [ 867.247183][T14565] ? release_sock+0x156/0x1c0 [ 867.251866][T14565] ? fault_create_debugfs_attr+0x180/0x180 [ 867.257676][T14565] ? page_to_nid.part.0+0x20/0x20 [ 867.262705][T14565] ? ___might_sleep+0x163/0x280 [ 867.267567][T14565] __should_failslab+0x121/0x190 [ 867.272524][T14565] should_failslab+0x9/0x14 [ 867.277024][T14565] kmem_cache_alloc_node+0x268/0x740 [ 867.277049][T14565] __alloc_skb+0xd5/0x5e0 [ 867.286641][T14565] ? netdev_alloc_frag+0x1b0/0x1b0 [ 867.291777][T14565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.298017][T14565] ? netlink_autobind.isra.0+0x228/0x310 [ 867.303652][T14565] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 867.309920][T14565] netlink_sendmsg+0x972/0xd60 04:51:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x40000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 867.309936][T14565] ? netlink_unicast+0x710/0x710 [ 867.309950][T14565] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 867.309979][T14565] ? apparmor_socket_sendmsg+0x2a/0x30 [ 867.310008][T14565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.310022][T14565] ? security_socket_sendmsg+0x8d/0xc0 [ 867.310041][T14565] ? netlink_unicast+0x710/0x710 [ 867.330699][T14565] sock_sendmsg+0xd7/0x130 [ 867.330715][T14565] sock_write_iter+0x27c/0x3e0 [ 867.330729][T14565] ? sock_sendmsg+0x130/0x130 [ 867.330748][T14565] ? aa_path_link+0x340/0x340 04:51:59 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 867.330771][T14565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 867.330786][T14565] ? iov_iter_init+0xee/0x210 [ 867.330802][T14565] new_sync_write+0x4d3/0x770 [ 867.330822][T14565] ? new_sync_read+0x800/0x800 [ 867.386205][T14565] ? __fget+0xa3/0x560 [ 867.390282][T14565] ? common_file_perm+0x238/0x720 [ 867.395325][T14565] ? __fget+0x384/0x560 [ 867.399509][T14565] ? apparmor_file_permission+0x25/0x30 [ 867.405113][T14565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:51:59 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c, 0x0}], 0x1, 0x0) [ 867.411371][T14565] ? security_file_permission+0x8f/0x380 [ 867.417015][T14565] __vfs_write+0xe1/0x110 [ 867.421352][T14565] vfs_write+0x268/0x5d0 [ 867.425601][T14565] ksys_write+0x14f/0x290 [ 867.429934][T14565] ? __ia32_sys_read+0xb0/0xb0 [ 867.434701][T14565] ? switch_fpu_return+0x1fa/0x4f0 [ 867.439822][T14565] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 867.445892][T14565] __x64_sys_write+0x73/0xb0 [ 867.450481][T14565] do_syscall_64+0xfa/0x760 [ 867.454987][T14565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.460880][T14565] RIP: 0033:0x459829 [ 867.464780][T14565] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 867.484390][T14565] RSP: 002b:00007fb94e216c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 867.492807][T14565] RAX: ffffffffffffffda RBX: 00007fb94e216c90 RCX: 0000000000459829 [ 867.500783][T14565] RDX: 00000000000000fc RSI: 0000000020000140 RDI: 0000000000000003 [ 867.508752][T14565] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 867.516728][T14565] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb94e2176d4 [ 867.524702][T14565] R13: 00000000004c5d9f R14: 00000000004e0070 R15: 0000000000000006 [ 867.545910][T14551] input: syz0 as /devices/virtual/input/input1034 04:51:59 executing program 3: r0 = socket(0x8, 0x7, 0x9) getsockname(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x2e6) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x84) syz_open_pts(r1, 0x0) connect$netlink(r0, &(0x7f0000000140)=@unspec, 0xc) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x39) connect$llc(r0, &(0x7f0000000100)={0x1a, 0x307, 0x6, 0x200, 0x5, 0x1, @remote}, 0x10) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x3) r3 = dup(r0) write$uinput_user_dev(r3, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) 04:51:59 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:51:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:51:59 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:51:59 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 867.748028][T14694] FAULT_INJECTION: forcing a failure. [ 867.748028][T14694] name failslab, interval 1, probability 0, space 0, times 0 04:51:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 867.835612][T14694] CPU: 0 PID: 14694 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190726 #53 [ 867.844779][T14694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.854850][T14694] Call Trace: [ 867.854882][T14694] dump_stack+0x172/0x1f0 [ 867.854904][T14694] should_fail.cold+0xa/0x15 [ 867.854920][T14694] ? __kasan_check_read+0x11/0x20 [ 867.854944][T14694] ? fault_create_debugfs_attr+0x180/0x180 [ 867.878030][T14694] ? page_to_nid.part.0+0x20/0x20 [ 867.878048][T14694] ? ___might_sleep+0x163/0x280 [ 867.878070][T14694] __should_failslab+0x121/0x190 [ 867.887927][T14694] should_failslab+0x9/0x14 [ 867.887942][T14694] kmem_cache_alloc_node_trace+0x274/0x750 [ 867.887955][T14694] ? kasan_unpoison_shadow+0x35/0x50 [ 867.887971][T14694] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 867.887990][T14694] __kmalloc_node_track_caller+0x3d/0x70 [ 867.903219][T14694] __kmalloc_reserve.isra.0+0x40/0xf0 [ 867.919943][T14694] __alloc_skb+0x10b/0x5e0 [ 867.919959][T14694] ? netdev_alloc_frag+0x1b0/0x1b0 [ 867.919978][T14694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.920000][T14694] ? netlink_autobind.isra.0+0x228/0x310 [ 867.946819][T14694] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 867.953090][T14694] netlink_sendmsg+0x972/0xd60 [ 867.957892][T14694] ? netlink_unicast+0x710/0x710 [ 867.962848][T14694] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 867.968418][T14694] ? apparmor_socket_sendmsg+0x2a/0x30 [ 867.968436][T14694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 867.968448][T14694] ? security_socket_sendmsg+0x8d/0xc0 [ 867.968461][T14694] ? netlink_unicast+0x710/0x710 [ 867.968477][T14694] sock_sendmsg+0xd7/0x130 [ 867.968500][T14694] sock_write_iter+0x27c/0x3e0 [ 867.999959][T14694] ? sock_sendmsg+0x130/0x130 [ 868.004672][T14694] ? aa_path_link+0x340/0x340 [ 868.009380][T14694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 868.015644][T14694] ? iov_iter_init+0xee/0x210 [ 868.020343][T14694] new_sync_write+0x4d3/0x770 [ 868.025033][T14694] ? new_sync_read+0x800/0x800 [ 868.029799][T14694] ? __fget+0xa3/0x560 [ 868.033881][T14694] ? common_file_perm+0x238/0x720 [ 868.038911][T14694] ? __fget+0x384/0x560 [ 868.043083][T14694] ? apparmor_file_permission+0x25/0x30 [ 868.048640][T14694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.054902][T14694] ? security_file_permission+0x8f/0x380 [ 868.060548][T14694] __vfs_write+0xe1/0x110 [ 868.064887][T14694] vfs_write+0x268/0x5d0 [ 868.069141][T14694] ksys_write+0x14f/0x290 [ 868.073479][T14694] ? __ia32_sys_read+0xb0/0xb0 [ 868.078265][T14694] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 04:52:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0x2, 0xfffffffffffffffc, 0x2b, &(0x7f0000000040)="bc4557edc8c20bb8cbad25e875a77ef40ddaf487a60e348a7bb953ab3810189742ce73ba69cfb1bc3d54e9"}) socket$kcm(0x29, 0x0, 0x0) 04:52:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:00 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) [ 868.084347][T14694] __x64_sys_write+0x73/0xb0 [ 868.088950][T14694] do_syscall_64+0xfa/0x760 [ 868.093463][T14694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.099362][T14694] RIP: 0033:0x459829 [ 868.103272][T14694] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.122886][T14694] RSP: 002b:00007fb94e216c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 868.131314][T14694] RAX: ffffffffffffffda RBX: 00007fb94e216c90 RCX: 0000000000459829 [ 868.139300][T14694] RDX: 00000000000000fc RSI: 0000000020000140 RDI: 0000000000000003 [ 868.147287][T14694] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 868.155281][T14694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb94e2176d4 [ 868.163276][T14694] R13: 00000000004c5d9f R14: 00000000004e0070 R15: 0000000000000006 [ 868.179295][T14815] input: syz0 as /devices/virtual/input/input1037 04:52:00 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20480]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:00 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 868.258017][T14826] input: syz0 as /devices/virtual/input/input1038 04:52:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x7ff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0xa2) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 868.364217][T14839] FAULT_INJECTION: forcing a failure. [ 868.364217][T14839] name failslab, interval 1, probability 0, space 0, times 0 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 868.461252][T14839] CPU: 1 PID: 14839 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190726 #53 [ 868.470406][T14839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.480464][T14839] Call Trace: [ 868.483773][T14839] dump_stack+0x172/0x1f0 [ 868.488118][T14839] should_fail.cold+0xa/0x15 [ 868.492723][T14839] ? fault_create_debugfs_attr+0x180/0x180 [ 868.498543][T14839] ? netlink_remove_tap+0x4d0/0x4d0 [ 868.503762][T14839] __should_failslab+0x121/0x190 [ 868.508723][T14839] should_failslab+0x9/0x14 [ 868.513235][T14839] kmem_cache_alloc+0x47/0x710 [ 868.518013][T14839] ? lock_acquire+0x190/0x410 [ 868.522683][T14839] ? netlink_deliver_tap+0x146/0xbf0 [ 868.527977][T14839] skb_clone+0x154/0x3d0 [ 868.532224][T14839] netlink_deliver_tap+0x94d/0xbf0 [ 868.537335][T14839] netlink_unicast+0x5a2/0x710 [ 868.542091][T14839] ? netlink_attachskb+0x7c0/0x7c0 [ 868.547195][T14839] ? _copy_from_iter_full+0x25d/0x8a0 [ 868.552559][T14839] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 868.558276][T14839] ? __check_object_size+0x3d/0x43c [ 868.563453][T14839] netlink_sendmsg+0x8a5/0xd60 [ 868.568226][T14839] ? netlink_unicast+0x710/0x710 [ 868.573158][T14839] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 868.578680][T14839] ? apparmor_socket_sendmsg+0x2a/0x30 [ 868.584117][T14839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.590337][T14839] ? security_socket_sendmsg+0x8d/0xc0 [ 868.595786][T14839] ? netlink_unicast+0x710/0x710 [ 868.600720][T14839] sock_sendmsg+0xd7/0x130 [ 868.605151][T14839] sock_write_iter+0x27c/0x3e0 [ 868.609894][T14839] ? sock_sendmsg+0x130/0x130 [ 868.614553][T14839] ? aa_path_link+0x340/0x340 [ 868.619210][T14839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 868.625430][T14839] ? iov_iter_init+0xee/0x210 [ 868.630104][T14839] new_sync_write+0x4d3/0x770 [ 868.634764][T14839] ? new_sync_read+0x800/0x800 [ 868.639507][T14839] ? __fget+0xa3/0x560 [ 868.643569][T14839] ? common_file_perm+0x238/0x720 [ 868.648604][T14839] ? __fget+0x384/0x560 [ 868.652776][T14839] ? apparmor_file_permission+0x25/0x30 [ 868.658304][T14839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.664529][T14839] ? security_file_permission+0x8f/0x380 [ 868.670140][T14839] __vfs_write+0xe1/0x110 [ 868.674460][T14839] vfs_write+0x268/0x5d0 [ 868.678700][T14839] ksys_write+0x14f/0x290 [ 868.683030][T14839] ? __ia32_sys_read+0xb0/0xb0 [ 868.687784][T14839] ? switch_fpu_return+0x1fa/0x4f0 [ 868.692880][T14839] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 868.698939][T14839] __x64_sys_write+0x73/0xb0 [ 868.703521][T14839] do_syscall_64+0xfa/0x760 [ 868.708024][T14839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.713906][T14839] RIP: 0033:0x459829 [ 868.717791][T14839] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.737390][T14839] RSP: 002b:00007fb94e216c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 868.745777][T14839] RAX: ffffffffffffffda RBX: 00007fb94e216c90 RCX: 0000000000459829 [ 868.753733][T14839] RDX: 00000000000000fc RSI: 0000000020000140 RDI: 0000000000000003 [ 868.761699][T14839] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 868.769737][T14839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb94e2176d4 [ 868.777699][T14839] R13: 00000000004c5d9f R14: 00000000004e0070 R15: 0000000000000006 04:52:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:00 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:00 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0000004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:00 executing program 3: ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) r0 = dup(0xffffffffffffffff) write$uinput_user_dev(r0, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:00 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 868.990607][T14963] FAULT_INJECTION: forcing a failure. [ 868.990607][T14963] name failslab, interval 1, probability 0, space 0, times 0 [ 869.017089][T14963] CPU: 1 PID: 14963 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190726 #53 [ 869.026305][T14963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.036360][T14963] Call Trace: [ 869.039659][T14963] dump_stack+0x172/0x1f0 [ 869.044000][T14963] should_fail.cold+0xa/0x15 [ 869.048606][T14963] ? fault_create_debugfs_attr+0x180/0x180 [ 869.054419][T14963] ? page_to_nid.part.0+0x20/0x20 [ 869.059452][T14963] ? ___might_sleep+0x163/0x280 [ 869.064312][T14963] __should_failslab+0x121/0x190 [ 869.064329][T14963] should_failslab+0x9/0x14 [ 869.064342][T14963] kmem_cache_alloc_node+0x268/0x740 [ 869.064360][T14963] ? addrlbl_ifindex_exists+0x170/0x170 [ 869.064382][T14963] __alloc_skb+0xd5/0x5e0 04:52:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) r2 = gettid() ptrace$peek(0x2, r2, &(0x7f0000000040)) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:01 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 869.073819][T14963] ? netdev_alloc_frag+0x1b0/0x1b0 [ 869.073836][T14963] ? addrlbl_ifindex_exists+0x170/0x170 [ 869.073859][T14963] ? rtnetlink_rcv_msg+0x838/0xb00 [ 869.104691][T14963] netlink_ack+0x25c/0xb30 [ 869.109123][T14963] ? netlink_sendmsg+0xd60/0xd60 [ 869.114072][T14963] ? __copy_skb_header+0x280/0x550 [ 869.119200][T14963] netlink_rcv_skb+0x376/0x450 [ 869.123974][T14963] ? rtnetlink_put_metrics+0x580/0x580 [ 869.129437][T14963] ? netlink_ack+0xb30/0xb30 [ 869.134029][T14963] ? netlink_deliver_tap+0x254/0xbf0 [ 869.134048][T14963] rtnetlink_rcv+0x1d/0x30 [ 869.134068][T14963] netlink_unicast+0x531/0x710 [ 869.148512][T14963] ? netlink_attachskb+0x7c0/0x7c0 [ 869.153633][T14963] ? _copy_from_iter_full+0x25d/0x8a0 [ 869.159008][T14963] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 869.159031][T14963] ? __check_object_size+0x3d/0x43c [ 869.169918][T14963] netlink_sendmsg+0x8a5/0xd60 [ 869.174691][T14963] ? netlink_unicast+0x710/0x710 [ 869.179634][T14963] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 869.179652][T14963] ? apparmor_socket_sendmsg+0x2a/0x30 04:52:01 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1030000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 869.179668][T14963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 869.179688][T14963] ? security_socket_sendmsg+0x8d/0xc0 [ 869.202332][T14963] ? netlink_unicast+0x710/0x710 [ 869.207277][T14963] sock_sendmsg+0xd7/0x130 [ 869.211702][T14963] sock_write_iter+0x27c/0x3e0 [ 869.211719][T14963] ? sock_sendmsg+0x130/0x130 [ 869.211740][T14963] ? aa_path_link+0x340/0x340 [ 869.211768][T14963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 869.232050][T14963] ? iov_iter_init+0xee/0x210 [ 869.236733][T14963] new_sync_write+0x4d3/0x770 [ 869.239239][T14976] input: syz0 as /devices/virtual/input/input1039 [ 869.241421][T14963] ? new_sync_read+0x800/0x800 [ 869.241434][T14963] ? __fget+0xa3/0x560 [ 869.241457][T14963] ? common_file_perm+0x238/0x720 [ 869.261664][T14963] ? __fget+0x384/0x560 [ 869.265833][T14963] ? apparmor_file_permission+0x25/0x30 [ 869.271384][T14963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 869.277627][T14963] ? security_file_permission+0x8f/0x380 [ 869.277644][T14963] __vfs_write+0xe1/0x110 [ 869.277660][T14963] vfs_write+0x268/0x5d0 [ 869.277675][T14963] ksys_write+0x14f/0x290 [ 869.277694][T14963] ? __ia32_sys_read+0xb0/0xb0 [ 869.296175][T14963] ? switch_fpu_return+0x1fa/0x4f0 [ 869.296195][T14963] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 869.296222][T14963] __x64_sys_write+0x73/0xb0 [ 869.316688][T14963] do_syscall_64+0xfa/0x760 [ 869.316706][T14963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 869.316717][T14963] RIP: 0033:0x459829 [ 869.316732][T14963] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 869.316739][T14963] RSP: 002b:00007fb94e216c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 869.316767][T14963] RAX: ffffffffffffffda RBX: 00007fb94e216c90 RCX: 0000000000459829 [ 869.327118][T14963] RDX: 00000000000000fc RSI: 0000000020000140 RDI: 0000000000000003 [ 869.327126][T14963] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 869.327135][T14963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb94e2176d4 04:52:01 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:01 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 869.327143][T14963] R13: 00000000004c5d9f R14: 00000000004e0070 R15: 0000000000000006 04:52:01 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x37dc12502000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:01 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 869.632507][T15264] FAULT_INJECTION: forcing a failure. [ 869.632507][T15264] name failslab, interval 1, probability 0, space 0, times 0 04:52:01 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x200000) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000080)={0x2, 0x2}) fsync(r0) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) 04:52:01 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:01 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 869.682439][T15264] CPU: 0 PID: 15264 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190726 #53 [ 869.691596][T15264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.701667][T15264] Call Trace: [ 869.704974][T15264] dump_stack+0x172/0x1f0 [ 869.709334][T15264] should_fail.cold+0xa/0x15 [ 869.713939][T15264] ? fault_create_debugfs_attr+0x180/0x180 [ 869.719753][T15264] ? page_to_nid.part.0+0x20/0x20 [ 869.725308][T15264] ? ___might_sleep+0x163/0x280 04:52:01 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 869.730217][T15264] __should_failslab+0x121/0x190 [ 869.735158][T15264] should_failslab+0x9/0x14 [ 869.739667][T15264] kmem_cache_alloc_node_trace+0x274/0x750 [ 869.745476][T15264] ? kasan_unpoison_shadow+0x35/0x50 [ 869.750769][T15264] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 869.756586][T15264] __kmalloc_node_track_caller+0x3d/0x70 [ 869.762230][T15264] __kmalloc_reserve.isra.0+0x40/0xf0 [ 869.767608][T15264] __alloc_skb+0x10b/0x5e0 [ 869.772024][T15264] ? netdev_alloc_frag+0x1b0/0x1b0 [ 869.772041][T15264] ? addrlbl_ifindex_exists+0x170/0x170 [ 869.772069][T15264] ? rtnetlink_rcv_msg+0x838/0xb00 [ 869.787809][T15264] netlink_ack+0x25c/0xb30 [ 869.787828][T15264] ? netlink_sendmsg+0xd60/0xd60 [ 869.787849][T15264] ? __copy_skb_header+0x280/0x550 [ 869.797241][T15264] netlink_rcv_skb+0x376/0x450 [ 869.797267][T15264] ? rtnetlink_put_metrics+0x580/0x580 [ 869.797287][T15264] ? netlink_ack+0xb30/0xb30 [ 869.817154][T15264] ? netlink_deliver_tap+0x254/0xbf0 [ 869.817174][T15264] rtnetlink_rcv+0x1d/0x30 [ 869.817194][T15264] netlink_unicast+0x531/0x710 04:52:01 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 869.831652][T15264] ? netlink_attachskb+0x7c0/0x7c0 [ 869.831678][T15264] ? _copy_from_iter_full+0x25d/0x8a0 [ 869.831694][T15264] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 869.831717][T15264] ? __check_object_size+0x3d/0x43c [ 869.853066][T15264] netlink_sendmsg+0x8a5/0xd60 [ 869.857835][T15264] ? netlink_unicast+0x710/0x710 [ 869.862775][T15264] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 869.868318][T15264] ? apparmor_socket_sendmsg+0x2a/0x30 [ 869.868335][T15264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 869.868357][T15264] ? security_socket_sendmsg+0x8d/0xc0 [ 869.880063][T15264] ? netlink_unicast+0x710/0x710 [ 869.880081][T15264] sock_sendmsg+0xd7/0x130 [ 869.880100][T15264] sock_write_iter+0x27c/0x3e0 [ 869.890484][T15264] ? sock_sendmsg+0x130/0x130 [ 869.899678][T15264] ? aa_path_link+0x340/0x340 [ 869.899702][T15264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 869.909038][T15264] ? iov_iter_init+0xee/0x210 [ 869.909056][T15264] new_sync_write+0x4d3/0x770 [ 869.909075][T15264] ? new_sync_read+0x800/0x800 [ 869.924614][T15264] ? __fget+0xa3/0x560 04:52:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 869.924635][T15264] ? common_file_perm+0x238/0x720 [ 869.924648][T15264] ? __fget+0x384/0x560 [ 869.924668][T15264] ? apparmor_file_permission+0x25/0x30 [ 869.930597][T15323] input: syz0 as /devices/virtual/input/input1041 [ 869.933473][T15264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 869.933491][T15264] ? security_file_permission+0x8f/0x380 [ 869.933507][T15264] __vfs_write+0xe1/0x110 [ 869.933525][T15264] vfs_write+0x268/0x5d0 [ 869.942673][T15264] ksys_write+0x14f/0x290 [ 869.942692][T15264] ? __ia32_sys_read+0xb0/0xb0 [ 869.984075][T15264] ? switch_fpu_return+0x1fa/0x4f0 [ 869.989194][T15264] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 869.995276][T15264] __x64_sys_write+0x73/0xb0 [ 869.999864][T15264] do_syscall_64+0xfa/0x760 [ 870.004370][T15264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.010270][T15264] RIP: 0033:0x459829 [ 870.014169][T15264] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.033776][T15264] RSP: 002b:00007fb94e216c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 870.042191][T15264] RAX: ffffffffffffffda RBX: 00007fb94e216c90 RCX: 0000000000459829 [ 870.050169][T15264] RDX: 00000000000000fc RSI: 0000000020000140 RDI: 0000000000000003 [ 870.058157][T15264] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 870.066133][T15264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb94e2176d4 [ 870.066141][T15264] R13: 00000000004c5d9f R14: 00000000004e0070 R15: 0000000000000006 04:52:02 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:02 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 870.268983][T15354] FAULT_INJECTION: forcing a failure. [ 870.268983][T15354] name failslab, interval 1, probability 0, space 0, times 0 [ 870.316535][T15354] CPU: 1 PID: 15354 Comm: syz-executor.2 Not tainted 5.3.0-rc1-next-20190726 #53 [ 870.325686][T15354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.335736][T15354] Call Trace: [ 870.339077][T15354] dump_stack+0x172/0x1f0 [ 870.343424][T15354] should_fail.cold+0xa/0x15 [ 870.348018][T15354] ? __kasan_check_read+0x11/0x20 [ 870.353054][T15354] ? fault_create_debugfs_attr+0x180/0x180 [ 870.358871][T15354] ? sk_filter_trim_cap+0x433/0xb30 04:52:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:02 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x8000, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 870.364063][T15354] ? __kasan_check_read+0x11/0x20 [ 870.369092][T15354] __should_failslab+0x121/0x190 [ 870.374035][T15354] should_failslab+0x9/0x14 [ 870.378557][T15354] kmem_cache_alloc+0x47/0x710 [ 870.383356][T15354] ? lock_acquire+0x190/0x410 [ 870.388035][T15354] ? netlink_deliver_tap+0x146/0xbf0 [ 870.393329][T15354] skb_clone+0x154/0x3d0 [ 870.397577][T15354] netlink_deliver_tap+0x94d/0xbf0 [ 870.397595][T15354] __netlink_sendskb+0x62/0xc0 [ 870.397608][T15354] netlink_unicast+0x60a/0x710 [ 870.397624][T15354] ? netlink_attachskb+0x7c0/0x7c0 [ 870.397642][T15354] netlink_ack+0x63f/0xb30 [ 870.397666][T15354] ? netlink_sendmsg+0xd60/0xd60 [ 870.417369][T15354] ? __copy_skb_header+0x280/0x550 [ 870.417397][T15354] netlink_rcv_skb+0x376/0x450 [ 870.431844][T15354] ? rtnetlink_put_metrics+0x580/0x580 [ 870.431867][T15354] ? netlink_ack+0xb30/0xb30 [ 870.446656][T15354] ? netlink_deliver_tap+0x254/0xbf0 [ 870.451946][T15354] rtnetlink_rcv+0x1d/0x30 [ 870.456375][T15354] netlink_unicast+0x531/0x710 [ 870.461139][T15354] ? netlink_attachskb+0x7c0/0x7c0 [ 870.461155][T15354] ? _copy_from_iter_full+0x25d/0x8a0 [ 870.461177][T15354] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 870.469824][T15455] input: syz0 as /devices/virtual/input/input1043 [ 870.471635][T15354] ? __check_object_size+0x3d/0x43c [ 870.471653][T15354] netlink_sendmsg+0x8a5/0xd60 [ 870.471672][T15354] ? netlink_unicast+0x710/0x710 [ 870.488954][T15354] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 870.488971][T15354] ? apparmor_socket_sendmsg+0x2a/0x30 [ 870.488993][T15354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.515854][T15354] ? security_socket_sendmsg+0x8d/0xc0 [ 870.521320][T15354] ? netlink_unicast+0x710/0x710 [ 870.526265][T15354] sock_sendmsg+0xd7/0x130 [ 870.530691][T15354] sock_write_iter+0x27c/0x3e0 [ 870.535465][T15354] ? sock_sendmsg+0x130/0x130 [ 870.540152][T15354] ? aa_path_link+0x340/0x340 [ 870.544836][T15354] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.551077][T15354] ? iov_iter_init+0xee/0x210 [ 870.555767][T15354] new_sync_write+0x4d3/0x770 [ 870.560497][T15354] ? new_sync_read+0x800/0x800 [ 870.565272][T15354] ? __fget+0xa3/0x560 [ 870.569354][T15354] ? common_file_perm+0x238/0x720 [ 870.574413][T15354] ? __fget+0x384/0x560 [ 870.578693][T15354] ? apparmor_file_permission+0x25/0x30 [ 870.584257][T15354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.590517][T15354] ? security_file_permission+0x8f/0x380 [ 870.590533][T15354] __vfs_write+0xe1/0x110 [ 870.590547][T15354] vfs_write+0x268/0x5d0 [ 870.590563][T15354] ksys_write+0x14f/0x290 [ 870.590582][T15354] ? __ia32_sys_read+0xb0/0xb0 [ 870.600523][T15354] ? switch_fpu_return+0x1fa/0x4f0 [ 870.600543][T15354] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 870.600560][T15354] __x64_sys_write+0x73/0xb0 [ 870.600576][T15354] do_syscall_64+0xfa/0x760 [ 870.600593][T15354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.600604][T15354] RIP: 0033:0x459829 [ 870.600622][T15354] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:52:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 870.634125][T15354] RSP: 002b:00007fb94e216c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 870.634139][T15354] RAX: ffffffffffffffda RBX: 00007fb94e216c90 RCX: 0000000000459829 [ 870.634155][T15354] RDX: 00000000000000fc RSI: 0000000020000140 RDI: 0000000000000003 [ 870.643913][T15354] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 870.643921][T15354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb94e2176d4 [ 870.643930][T15354] R13: 00000000004c5d9f R14: 00000000004e0070 R15: 0000000000000006 04:52:02 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 870.743919][T15455] input: syz0 as /devices/virtual/input/input1044 04:52:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x225c17d03, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:02 executing program 2 (fault-call:3 fault-nth:6): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:02 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0xfffffffffffffebd, 0x3e7, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0x6, 0x4) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x800) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x2, @local, 'gretap0\x00'}}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x3) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f00000002c0)=[0x6, 0x4]) setsockopt$inet6_tcp_int(r3, 0x6, 0x1b, &(0x7f0000000080)=0xe06, 0x4) r4 = dup(r2) write$uinput_user_dev(r4, &(0x7f0000000980)={'syz0\x00'}, 0x45c) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x4e23, 0x20, @mcast2, 0x1e}}}, 0x88) ioctl$UI_DEV_CREATE(r2, 0x5501) 04:52:03 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:03 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0000004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 871.078448][T15589] input: syz0 as /devices/virtual/input/input1045 04:52:03 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:03 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="0f0000004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) [ 871.219400][T15614] input: syz0 as /devices/virtual/input/input1046 04:52:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0xfff, 0xffffffff, 0x2}) ioctl$UI_DEV_CREATE(r0, 0x5501) rt_sigsuspend(&(0x7f0000000080)={0x37b0}, 0x8) 04:52:03 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:03 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 871.444305][T15717] input: syz0 as /devices/virtual/input/input1047 04:52:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:03 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:03 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="1b0000004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:03 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:04 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x37dc12502000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x16) r1 = dup(r0) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x200) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f00000000c0)={0x7, 0x3f, [{0x3ff}, {0x9, 0x0, 0x6}, {0x1, 0x0, 0x4}, {0x3}, {0xb, 0x0, 0x1}, {0x6da, 0x0, 0x7}, {0x401, 0x0, 0x10000}]}) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x9c3, 0x400) 04:52:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 872.188247][T15717] input: syz0 as /devices/virtual/input/input1048 04:52:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:04 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="c00e00004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1c) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:04 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 872.542557][T16502] input: syz0 as /devices/virtual/input/input1051 04:52:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x200001, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) r3 = add_key(&(0x7f0000000740)='id_resolver\x00', &(0x7f0000000780)={'syz', 0x1}, &(0x7f00000007c0)="5e0fb428862a7931f89fe6b3905f7ef8ed675f566ab9a608c87b1030bec1e1e5dba9f2b40ee5901e8fbf2470d5031cf297c21074ac14373c11050cff2a45fe8d3d4e1199874af993066ebf79", 0x4c, 0xfffffffffffffff9) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000700)={'syzkaller1\x00', {0x2, 0x4e24, @multicast2}}) syncfs(r1) ftruncate(r1, 0x6) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f00000006c0)=0xffffffff9c2efafa) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000640)=""/98) recvmsg(r2, &(0x7f0000000600)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/17, 0x11}, {&(0x7f0000000140)=""/247, 0xf7}, {0x0}, {&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/216, 0xd8}, {&(0x7f0000000440)=""/97, 0x61}], 0x6, &(0x7f0000000540)=""/177, 0xb1}, 0x1) 04:52:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:04 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 872.856208][T16785] input: syz0 as /devices/virtual/input/input1053 04:52:04 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 872.935443][T16873] input: syz0 as /devices/virtual/input/input1054 04:52:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800208}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9ca}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 04:52:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 873.248807][T17111] input: syz0 as /devices/virtual/input/input1055 04:52:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000040)) 04:52:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="effdffff4900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 873.540057][T17287] input: syz0 as /devices/virtual/input/input1057 04:52:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 873.634427][T17287] input: syz0 as /devices/virtual/input/input1058 04:52:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x4) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040)={0x3, 0xffffffffffffffff, 0x1}) r2 = dup(r1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:05 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) read(r0, &(0x7f0000000040)=""/46, 0x2e) 04:52:05 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 874.092556][T17834] input: syz0 as /devices/virtual/input/input1061 04:52:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 874.163941][T17834] input: syz0 as /devices/virtual/input/input1062 04:52:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000040)={{0xff, @remote, 0x4e22, 0x1, 'none\x00', 0x4, 0x3ad066fc, 0x2a}, {@broadcast, 0x4e21, 0x2002, 0x9, 0xe086, 0x3}}, 0x44) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) socket$inet_smc(0x2b, 0x1, 0x0) 04:52:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0200004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 874.421726][T18059] IPVS: set_ctl: invalid protocol: 255 172.20.20.187:20002 [ 874.475736][T18059] input: syz0 as /devices/virtual/input/input1063 04:52:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 874.568198][T18273] IPVS: set_ctl: invalid protocol: 255 172.20.20.187:20002 04:52:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f00000000c0)={0x1000, &(0x7f0000000e00)="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"}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 874.813899][T18338] input: syz0 as /devices/virtual/input/input1065 04:52:06 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040200]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 874.944028][T18403] input: syz0 as /devices/virtual/input/input1066 04:52:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x8b3, 0x4) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x40) getsockopt$inet6_tcp_int(r2, 0x6, 0xbf0aeb96facfef7c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x121080) r3 = dup(r0) write$uinput_user_dev(r3, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0500004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x5, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x6, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 875.345242][T18529] input: syz0 as /devices/virtual/input/input1067 04:52:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8050000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 875.403728][T18643] input: syz0 as /devices/virtual/input/input1068 04:52:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) socket$pppoe(0x18, 0x1, 0x0) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x7, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 875.634660][T18665] input: syz0 as /devices/virtual/input/input1069 04:52:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 875.727291][T18831] input: syz0 as /devices/virtual/input/input1070 04:52:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x8, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:07 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1}}]}}, &(0x7f0000000180)=""/4096, 0x32, 0x1000, 0x1}, 0x20) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000040)) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:07 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:07 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c, 0x0}], 0x1, 0x0) [ 875.947686][T18963] input: syz0 as /devices/virtual/input/input1071 04:52:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x300, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) bind$ax25(r1, &(0x7f0000000200)={{0x3, @bcast, 0x2}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null]}, 0x48) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {0x0, 0xffffffff}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000]}, 0x45c) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0xb7) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) migrate_pages(r2, 0xb2, &(0x7f0000000180)=0x9, &(0x7f00000001c0)=0x5) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000280)={{0x9, 0x5, 0x7, 0xfff, 'syz1\x00', 0x4}, 0x1, 0x1, 0x3, r2, 0x3, 0x52bc, 'syz1\x00', &(0x7f0000000080)=['}GPL\x00', '/dev/uinput\x00', '-\'*/\x00'], 0x16, [], [0x2, 0x5, 0x10001, 0x80]}) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000000c0)={0x3, 0xdd, [{0xffff, 0x0, 0x9}, {0xff, 0x0, 0x400}, {0x5, 0x0, 0x10001}]}) ioctl$CAPI_INSTALLED(r1, 0x80024322) ioctl$KIOCSOUND(r1, 0x4b2f, 0x9) 04:52:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x500, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 876.321636][T19321] input: syz0 as /devices/virtual/input/input1073 04:52:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 876.432569][T19336] input: syz0 as /devices/virtual/input/input1074 04:52:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x600, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz0\x00', {0x2, 0x9, 0x1000}, 0x4b, [0x2, 0x81, 0x2, 0x2, 0x8896, 0x9, 0x84b, 0x0, 0x4be9, 0x1, 0xfffffffffffffffb, 0x800, 0x0, 0x3fe, 0x101, 0x0, 0x81, 0x0, 0x1b8c, 0x5, 0x55, 0x8, 0x4, 0x9, 0x1, 0x2, 0x1000, 0x3ff, 0xedc, 0x0, 0x100000001, 0x9, 0x1, 0xffff, 0x1, 0x3, 0xffffffffffffff1a, 0x430, 0x10001, 0x0, 0xfd, 0x0, 0xfffffffffffffffb, 0xedd4, 0x81, 0xcf8, 0x7fffffff, 0x7ff, 0x7, 0x9, 0x7, 0x1, 0x2, 0x30, 0x7, 0x2, 0x200000000, 0x1a39ff57, 0xffff, 0x10001, 0x5a2, 0x101, 0x100000000, 0x3], [0x2, 0x1, 0x2, 0x0, 0x23, 0xffff, 0xfffffffffffffaf2, 0x5, 0x4, 0xff, 0x1, 0x7ff, 0x7f, 0x3, 0x9, 0x5, 0x8, 0x80000001, 0xffff, 0x6, 0x7, 0x3, 0x62ed89db, 0x101, 0x7f, 0x0, 0x0, 0x8, 0x7, 0x81, 0x9, 0xb, 0x0, 0x5, 0x8, 0x1, 0x100000000, 0x2, 0x5, 0x2, 0x0, 0x2, 0x5, 0x3, 0xa57, 0x9, 0x100000001, 0x20, 0x3f, 0x1, 0x800, 0x9, 0xffff, 0xffff00, 0xffffffffffffffff, 0xd43, 0x0, 0x8, 0x4, 0xfffffffffffffffe, 0x7, 0x0, 0x6, 0x20], [0x6, 0x0, 0x6, 0x3, 0x9, 0x153, 0x6, 0x10001, 0xe8, 0x0, 0x20, 0xbf6, 0x2, 0x1ff, 0x1, 0x0, 0x2, 0xb40f, 0x10000, 0x2, 0x1, 0x4, 0x7, 0x4, 0x7, 0x401, 0xc3, 0x744, 0x1, 0x7f, 0x9, 0x0, 0xff, 0x4, 0x2, 0x7, 0x9, 0x511bca04, 0x9, 0x6, 0x2, 0x8, 0x4, 0xa7, 0x0, 0x6, 0x1, 0x7b2, 0x1, 0x5, 0x1, 0x2ee0, 0x0, 0x8, 0x4, 0x9, 0x5, 0xfe00000000000000, 0xffffffffffff0001, 0xfff, 0x7, 0xfffffffffffffffe, 0x5, 0x47e5], [0x9, 0xe63, 0x9, 0x6, 0x4, 0x9, 0xfe, 0x6, 0x4, 0x400, 0x5, 0x8, 0x7fffffff, 0x3, 0x2, 0x4, 0x200, 0xffffffffffffff00, 0x6, 0x1, 0x2, 0x1, 0x400, 0x3, 0x7, 0x3, 0x9, 0xaf, 0x3, 0x8, 0x7fff, 0x9, 0x40, 0xc725, 0x8, 0x56, 0x1ff, 0x5, 0x2, 0x5, 0x1, 0x1, 0x80000000, 0x7ec, 0x5, 0x100, 0x10000, 0x3, 0x1, 0xffff, 0x9, 0x4, 0x5, 0x100000000, 0x2, 0x100000001, 0xffff, 0x6bd8bfb7, 0x8001, 0xff, 0x80000001, 0x1, 0x6, 0x7]}, 0x45c) r1 = dup(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x100, 0x0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = socket(0x1, 0x5, 0x5) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 04:52:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x700, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 876.794400][T19635] input: syz0 as /devices/virtual/input/input1075 04:52:08 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:08 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_netdev_private(r1, 0x89f7, &(0x7f00000002c0)="d637e0e73a07d32340454c4d08269c1b3f41be29e4d6ce4a84049214c2864d4c52f3c3099e81ee47ea229aebc9b2c03c6a6b429681577e72fabaef92708e9d7810b7ac0a84ea2914d08f42bd4dca8ca381be93f84353c1e4bbfb744272604edb139a7e9750f9d63fb209d4771b4051f48803a7be5d91702cae831a919cce6f365466881cb0fa20dc45e0bd3c5e586379975d6ce484675ecef2e6ccc3ed9cd09c957081b681e4d08c65d85774fb21ee24711ff0b239f2bc9f88e113e07e652e79c16d59c59a2ef9978f3434a7a923fbac69d652a93422") ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_NOOP(r3, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000003a40)={0x14, r4, 0x101}, 0x14}}, 0x0) r5 = dup(r0) write$uinput_user_dev(r5, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$sock_netrom_SIOCDELRT(r5, 0x890c, &(0x7f0000000040)={0x0, @null, @rose={'rose', 0x0}, 0x3, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1d0, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) setsockopt$netrom_NETROM_N2(r5, 0x103, 0x3, &(0x7f00000000c0)=0x100000000, 0x4) write$UHID_CREATE2(r5, &(0x7f0000000140)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x3e, 0x1, 0x2aa74eb9, 0x9, 0x7f, 0x4, "c056698f46025443cf82212dddfe4d7629e5993338a739b7e198375f6937dc2a589abffd6c79e4e6ecb33df5a56ee82a86ebf21d56708c72ba096b034bb4"}, 0x156) [ 876.944457][T19761] input: syz0 as /devices/virtual/input/input1076 04:52:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3f00, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 877.175861][T19895] input: syz0 as /devices/virtual/input/input1077 [ 877.263815][T20023] input: syz0 as /devices/virtual/input/input1078 04:52:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000700)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x5, &(0x7f0000000680)=[{&(0x7f0000000180)="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", 0xfd, 0x2000000000000}, {&(0x7f0000000280)="ada73627ae0bf6a30645c340b2032e6dd5444ba87d7c5bf03410b0d8d7c86969a70612baf15d24c0e05304dcd8b08e31f6008c3c7b88a3321626d85a47a0be213ae8884a85ebd39d61d50b31d190b7c6ed0db994ecf300c69fa16e8cd2214efd82e6811a94abec4b17097772e68c332d2edcb3a25bce0700312e2e6ede12e2dfc761552f0f332d6b1180c5aa4c22e7c65d8e1c981b3606e3ea4effe5b4c24dde1eb64dc72588f2b2c43cc869e7691974df6b7e089997a1a602b83c10f33f5d06f341e98ca54029b0d281d09fc6e08c910c63bdcb19df779dca3dfb", 0xdb, 0xff}, {&(0x7f0000000380)="ccd115798c9e2c694401e6f3f7896ee080ffc7ded0bda4d5a0ac9f28b60a4383c81a64f4e24ba1aff6e873a7231e95a7fa7b62a8a447490b2a2077ac5899a5b318a0696d940ddf15aefb48426986884d38ab5f7d5eb57ab047a5a2f9be55ab690c56d4a7ad7087e80d9c61733a0b2606cd6ee8ad5e57d3642cb8863e96909e3c705f3100f9682675833c0203f86601a75e6d50377bd0a2e2b5ca7a0c1d4f17fa876401570a40f1ca9aeb8a4419c5944d3fa3f68188fc6732c6274642beb410a4564b534fd3052665441fd3a5c2c03a4107661c12002252c559584a2b9bde458f7ca1857b138cdb537e90945d0c473d813b7901", 0xf3, 0x100000001}, {&(0x7f0000000480)="5cb0f7ef293e6c352b83433aa2cf8a1fe73dff375d62e657201941b5c57c82f90f868aa815437d17bc12befd65e3b24441a51b132ac26b01f3f5aca9e513f9b576cbc6552fe50cade773427130544e4192d2a5096fcc93d9a066c2acc7fa49adb59d9cb2c26e47fa0e5bf4d839dcc92f234820d02ac21ed3ea1e6f57e1ea770f1a7133d511c412eff3219786685b265b82e2381bb8cc4f6611aa41fd3deda6aa090a21f205832d318a80ac7a9243fc700ca98c92822b96187de39a386b580cc42da20f193913415756932e38c37eed334f7749fd975611f3f141", 0xda, 0x3ff}, {&(0x7f0000000580)="cfecf3b2331c789538528c8578074e81a15d83a2b6aa42fbba66606f5bbf61764cb568e5133164e8680b9adb7f6978491225302157842b68f7fdefada8d6350525c05015aa93e983281fdef162648d8e2340b6e980cff823b23cc2e9a5852b32c15353733e82c395738972a406183396df34a682d7eae2e2c67a685dfb70a8c571db84462077cdcf07adadee4037247e1db2894d17b7b2309584d905803967cbe9eb8fb6011e8bcd654054919b2db0182d50746cb6363c2dc2a6e0077ef5279551bc2239e473f0bfeff9863010309257599e65018be70430f32034", 0xdb, 0x2}], 0x1400, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8001, 0xfffffffffffffffa, 0x80000001, 0x7, 0x4}, &(0x7f0000000080)=0x14) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x40032, r1, 0x10000000) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x5d6f4218, 0x8000, 0x7, 0x400, r2}, 0x10) 04:52:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x400000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 877.607905][T20206] input: syz0 as /devices/virtual/input/input1079 04:52:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 877.658511][T20345] input: syz0 as /devices/virtual/input/input1080 04:52:09 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:09 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}, 0x754) bind$rose(r1, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x40) 04:52:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x1000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:09 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x2000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 878.131542][T20734] input: syz0 as /devices/virtual/input/input1083 04:52:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x5f2d}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x200, 0x100, 0x10000, 0x5, 0x6}, &(0x7f0000000100)=0x14) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 878.421515][T20915] input: syz0 as /devices/virtual/input/input1085 04:52:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000040)={0xf9, 0xe483, 0x6, 'queue1\x00', 0x7ff}) 04:52:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 878.638870][T21033] input: syz0 as /devices/virtual/input/input1087 04:52:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 878.734841][T21033] input: syz0 as /devices/virtual/input/input1088 04:52:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) write$uinput_user_dev(r2, &(0x7f0000000080)={'syz0\x00', {0xffff, 0x6, 0x8, 0x3}, 0x4e, [0x7ff, 0x6cb00000000, 0xfffffffffffffffe, 0xffffffffffffffc0, 0x9, 0x6, 0x7, 0xe5, 0x101, 0x5, 0x0, 0x8, 0x4, 0x9, 0x1, 0x7fff, 0x4, 0x7, 0x3, 0x6, 0x5, 0x3, 0x8000, 0x3ff, 0x3, 0x401, 0x84, 0xfffffffffffffffb, 0x80, 0x1, 0xffffffffffff0001, 0xd756, 0x1, 0x23, 0xffffffff, 0x5, 0x13, 0x1ff, 0x7, 0x81, 0x0, 0x400, 0x3, 0x7, 0x40, 0x400, 0xffffffff7fffffff, 0x2, 0x6, 0x9, 0x9, 0x1, 0x1, 0x81, 0x10001, 0xecc7, 0x400, 0x1, 0xe1, 0x26310, 0x0, 0x10001, 0x200, 0xfff], [0x7, 0x1000, 0x80, 0x5, 0x7ff, 0x4, 0x9, 0x9, 0x7, 0x3, 0x80000001, 0x100000001, 0x4, 0x0, 0x5, 0x9c, 0xfffffffffffffffa, 0x80, 0x3f, 0x800, 0x1800000, 0x1ff, 0x1f, 0x40, 0x100, 0x42fe5829, 0x80, 0x9, 0x908, 0x2, 0xfff, 0x7fffffff, 0x6352, 0x3, 0x2, 0x2, 0xbd, 0x80000000, 0x100, 0x3, 0x3, 0x4, 0x20, 0xbd, 0x8001, 0x20, 0x8001, 0x8, 0x40, 0x8000, 0x401, 0x3, 0x5, 0x0, 0x9, 0x10001, 0x52be, 0xfffffffffffff595, 0xffffffffffffffff, 0x4, 0x7, 0xfffffffffffffffb, 0x8, 0xfffffffffffffff7], [0x1f, 0x2, 0x8, 0x7fffffff, 0x800, 0x9, 0x81, 0x1000, 0x2, 0x8, 0x81, 0x200, 0x3, 0x5, 0x1800, 0xf1d, 0x8, 0x80000000, 0x4739, 0x8c, 0x8, 0x800, 0x0, 0x9, 0x9, 0x2, 0x9, 0x80000001, 0xd674, 0x7, 0x101, 0x40, 0x800, 0xfffffffffffffff8, 0xffffffffffffffff, 0x9a34, 0x7fff, 0x100000001, 0x100000000, 0x1, 0x2, 0x8, 0x2, 0x8001, 0x8, 0x0, 0xfffffffffffffff9, 0xffff, 0x5, 0x2, 0x1, 0x68, 0x2, 0x3, 0x8001, 0x24a7343b, 0x8, 0x1, 0x200, 0xffff, 0x7fffffff, 0x1, 0x0, 0x6], [0x0, 0x6, 0x4cbf, 0x4, 0x2, 0x8, 0xc85, 0x7, 0xe98c, 0xffff, 0xda, 0x3, 0x1, 0x4, 0x5, 0x9, 0x3, 0x2, 0x401, 0x9, 0x9, 0x3, 0xffffffff, 0x1ff, 0x5, 0x6b7c221a, 0x3, 0x0, 0x7, 0x51, 0x5, 0x200, 0x8, 0x3, 0x3ff, 0x7f, 0x200, 0xfffffffffffffff9, 0x10000, 0x9, 0x7ff, 0x80000000, 0x416, 0x1000, 0x7, 0x8, 0x6, 0xe47f, 0x1, 0x1, 0x20, 0x8, 0x20, 0x1, 0x4, 0xff, 0x5, 0x1000, 0x0, 0x6, 0xfffffffffffffffd, 0x7f, 0x7f, 0xffffffff]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:10 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x5000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:10 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 879.005235][T21363] input: syz0 as /devices/virtual/input/input1089 04:52:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xe, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 879.060042][T21572] input: syz0 as /devices/virtual/input/input1090 04:52:11 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='syz0\x00', &(0x7f00000000c0)="8539433bfcca5e19414b8573fcaaa3deb16bb9e92792deb5fcf506545bccebd2844d59e64343d0bbd62778008a8caa0c546a58543b2dcf29c0a42929b0485a93cef3da819b2a1afdc9561ee726c28bf70b7bdb17bcfa80afb038e1ddb512ca4f10cca73f55b79c8bdb39a509b05b7d11776df5e1ccd8478d96eab95e871f04680c9d36ce0816a236fddebc0042c5a39aa762c7190c5828f27546620aec7c470f31976b30b46d35fec7641a3b26db707ae76c6acc5833ec0ced62f119daee2a46f7c7b039bce118f2993b690eb74fc1", 0xcf) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) r2 = dup(r1) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000240)={0x80000001, 0x8, 0x1, r0}) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f00000001c0)=0x878) 04:52:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x6000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 879.275197][T21616] input: syz0 as /devices/virtual/input/input1091 04:52:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 879.347250][T21616] input: syz0 as /devices/virtual/input/input1092 04:52:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x5, 0x1, &(0x7f0000000080)=0x1ff}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x2d, 0x3, 0x0, {0x1, 0xc, 0x0, '/dev/uinput\x00'}}, 0x2d) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:52:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x7000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 879.625472][T21997] input: syz0 as /devices/virtual/input/input1093 04:52:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) dup(r0) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:52:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x8000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:11 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0003004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:11 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 879.893771][T22419] input: syz0 as /devices/virtual/input/input1095 [ 880.016631][T22468] input: syz0 as /devices/virtual/input/input1096 04:52:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1000, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x12, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x40000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 880.260101][T22692] input: syz0 as /devices/virtual/input/input1097 04:52:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) shutdown(r1, 0x8000001) 04:52:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x13, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 880.538860][T22938] input: syz0 as /devices/virtual/input/input1099 04:52:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 880.654061][T22950] input: syz0 as /devices/virtual/input/input1100 04:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0009004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:12 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x48080, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r3, r0, 0xff}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r4 = socket(0x4, 0xa, 0x9b) setsockopt$ax25_SO_BINDTODEVICE(r4, 0x101, 0x19, &(0x7f0000000000)=@netrom={'nr', 0x0}, 0x10) r5 = dup(r0) write$uinput_user_dev(r5, &(0x7f0000000980)={'syz0\x00'}, 0x45c) 04:52:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x14, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:12 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:12 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000080)=0x6000) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x15, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 881.256003][T23509] input: syz0 as /devices/virtual/input/input1103 04:52:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000) 04:52:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x16, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 881.551853][T23745] input: syz0 as /devices/virtual/input/input1105 04:52:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xa) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x17, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 881.821142][T23973] input: syz0 as /devices/virtual/input/input1107 04:52:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:13 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 881.904579][T23981] input: syz0 as /devices/virtual/input/input1108 04:52:13 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:13 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x6) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x18, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x225c17d03, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 882.176982][T24183] input: syz0 as /devices/virtual/input/input1109 04:52:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) close(r1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x18002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x19, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0011004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x2, 0x7f, 0x0, 0x9}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1a, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:14 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 882.789678][T24650] input: syz0 as /devices/virtual/input/input1113 04:52:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:14 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1b, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 883.023229][T24822] input: syz0 as /devices/virtual/input/input1115 04:52:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1c, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 883.327962][T25095] input: syz0 as /devices/virtual/input/input1117 04:52:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000100)=""/177, &(0x7f00000001c0)=0xb1) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000040)={0xd, 0x90e, {0x57, 0x2, 0x6, {0x80000001, 0x3}, {0xff, 0x8}, @rumble={0x3, 0x4}}, {0x57, 0x5, 0xffffffff80000001, {0x6, 0x3ff}, {0x7, 0xfff}, @rumble={0x3e5e, 0x2e}}}) 04:52:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x37dc12502000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1d, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 883.659634][T25285] input: syz0 as /devices/virtual/input/input1119 04:52:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 883.751883][T25333] input: syz0 as /devices/virtual/input/input1120 04:52:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc003f004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x6, 0x4) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:15 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:15 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1e, &(0x7f0000000440)={[{@noquota='noquota'}]}) [ 884.083777][T25560] input: syz0 as /devices/virtual/input/input1121 04:52:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 884.161392][T25684] input: syz0 as /devices/virtual/input/input1122 04:52:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) getsockopt$llc_int(r1, 0x10c, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:52:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 884.418287][T25862] input: syz0 as /devices/virtual/input/input1123 04:52:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 884.503067][T25989] input: syz0 as /devices/virtual/input/input1124 04:52:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x13) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x2) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x3, @ipv4={[], [], @broadcast}, 0x1}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @loopback}}, 0x7, 0xddbd}, &(0x7f0000000200)=0x90) 04:52:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2f, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 884.744869][T26153] input: syz0 as /devices/virtual/input/input1125 04:52:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 884.796704][T26218] input: syz0 as /devices/virtual/input/input1126 04:52:16 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x30, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:16 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 885.099607][T26441] input: syz0 as /devices/virtual/input/input1127 04:52:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004020000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 885.172286][T26480] input: syz0 as /devices/virtual/input/input1128 04:52:17 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x202001, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="670000003ed2adef8524424ae62dba63f09961a599c0297498ca7de9cd6157dee065bbafcb48753351be90eda1d16a6b51cd2f19dbbdbcd594de7f79eb378a5ac0a5895d1ec4da68f5d415c395e52781f9bef3a0720efdf29588d92313b8815af75d857255cd4e80d44690"], &(0x7f0000000180)=0x6f) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x80000001}, 0x8) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r3 = dup(r0) write$uinput_user_dev(r3, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) 04:52:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5c, &(0x7f0000000440)={[{@noquota='noquota'}]}) 04:52:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc805000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 885.430821][T26672] input: syz0 as /devices/virtual/input/input1129 04:52:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 885.505340][T26672] input: syz0 as /devices/virtual/input/input1130 04:52:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:17 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x800083) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) setns(r1, 0x2020000) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='\\oquota'}]}) 04:52:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 885.803922][T26939] input: syz0 as /devices/virtual/input/input1131 04:52:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 885.865655][T27014] input: syz0 as /devices/virtual/input/input1132 04:52:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:17 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:17 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x80000000, 0x40040) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) r2 = dup(r1) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f00000000c0)) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:52:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='n\\quota'}]}) 04:52:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:17 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 886.101170][T27129] input: syz0 as /devices/virtual/input/input1133 04:52:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 886.168601][T27240] input: syz0 as /devices/virtual/input/input1134 04:52:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:52:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noq\\ota'}]}) 04:52:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 886.382454][T27351] input: syz0 as /devices/virtual/input/input1135 04:52:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x3, 0x2, 0x100000000, 0x6, 0x1f, 0x549f1f25}}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noqu\\ta'}]}) 04:52:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 886.711606][T27575] input: syz0 as /devices/virtual/input/input1137 04:52:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:18 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x480, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) r2 = dup(r1) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:52:18 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquo\\a'}]}) [ 886.957222][T27771] input: syz0 as /devices/virtual/input/input1139 04:52:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 887.011706][T27805] input: syz0 as /devices/virtual/input/input1140 04:52:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquot\\'}]}) [ 887.303269][T28059] input: syz0 as /devices/virtual/input/input1141 04:52:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c, 0x800) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 887.561289][T28294] input: syz0 as /devices/virtual/input/input1143 04:52:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x2}) [ 887.628006][T28372] input: syz0 as /devices/virtual/input/input1144 04:52:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='projid_map\x00') ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000180)=""/60) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x39) r2 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000040)={{0x3f, @empty, 0x4e24, 0x1, 'dh\x00', 0x20, 0x3f, 0x74}, {@local, 0x4e21, 0x4, 0x10000, 0x2, 0x1}}, 0x44) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{0x7, 0x200, 0x100, 0x9d}, 'syz0\x00', 0xb}) 04:52:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 887.899644][T28574] input: syz0 as /devices/virtual/input/input1145 04:52:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x3}) 04:52:19 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:19 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KDSKBLED(r1, 0x4b65, 0x1f) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) 04:52:19 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x4}) 04:52:20 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40800, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0xe522, 0x101, [], &(0x7f0000000100)=0xffff}) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c, 0x0}], 0x1, 0x0) [ 888.468814][T29205] input: syz0 as /devices/virtual/input/input1149 04:52:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 888.589082][T29288] input: syz0 as /devices/virtual/input/input1150 04:52:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x5}) 04:52:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:20 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) getsockname$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0009004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x6}) [ 888.850579][T29632] input: syz0 as /devices/virtual/input/input1151 04:52:20 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) [ 888.937252][T29698] input: syz0 as /devices/virtual/input/input1152 04:52:20 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc000a004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) [ 889.194474][T29947] input: syz0 as /devices/virtual/input/input1153 04:52:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x7}) 04:52:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='mountinfo\x00') ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000100)={0x817, 0x40}) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e20, 0x7, @remote}}}, &(0x7f0000000280)=0x84) r3 = dup(r0) write$uinput_user_dev(r3, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000340)={0xa20000, 0x7, 0xcd, [], &(0x7f0000000300)={0x990bff, 0x6, [], @p_u8=&(0x7f00000002c0)=0x6}}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 04:52:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 889.532247][T30219] input: syz0 as /devices/virtual/input/input1155 04:52:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x8}) 04:52:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xdb5, 0x8000) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000080)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000008c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 04:52:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 889.860529][T30488] input: syz0 as /devices/virtual/input/input1157 04:52:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:21 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x300}) 04:52:21 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x6, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x2) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x7) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) dup(r0) ioctl$UI_DEV_CREATE(r0, 0x5501) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x118) 04:52:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc000e004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:22 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x200, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000100)={0x0, 0x1, 0x3, "bbba7d9cdb8e8a370eab29d2014c974ce2ad0aa38b176f12626df938dfe48a9a", 0x47425247}) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/38, 0x26}], 0x1) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x500}) 04:52:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 890.491327][T31103] input: syz0 as /devices/virtual/input/input1161 04:52:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 890.599144][T31113] input: syz0 as /devices/virtual/input/input1162 04:52:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:22 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000040)="7c3c0afdf64f3696d1fbeac98d56101776c7855c7402aeaa339d6fc9cee66c88bedc3a7b2d6419b7c8580f23403abbc372fb74bdd037f6fd4a20d67326e04af7fceacd1ba596c66da15334a34f16711cfffeb0fb8f72de4faf2037768c500997a6790bece0ecadbc5947044bb63f0e1afc5c71d056778364c7011076f32456bca7ada8a663b16e0f2a1443092a4cabdaf3615cc53a1f93f6c9f8769027a288e452bb39aed3fbc568c134c7c34d70adffe82143bb", 0xb4) 04:52:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x600}) 04:52:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 890.838735][T31423] input: syz0 as /devices/virtual/input/input1163 04:52:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:22 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:22 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800000000000000, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) ioctl$VFIO_SET_IOMMU(r0, 0x3b66, 0x8) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x2, 0x24, "8fcebffde94ac4d743f77141c4d0dcb1b9fe6801277284c47b72d067ec79799f949e7077"}) 04:52:22 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x700}) 04:52:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:23 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x3fffff6, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x18) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) socket$caif_stream(0x25, 0x1, 0x2) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = fcntl$getown(r0, 0x9) getpgrp(r2) 04:52:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x3f00}) 04:52:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xe, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:23 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xe) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 891.746676][T32110] input: syz0 as /devices/virtual/input/input1167 04:52:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:23 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) fadvise64(r1, 0x0, 0x10000, 0x7) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x2, '=K'}, 0x3) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x4000}) 04:52:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0xf, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 892.009165][T32381] input: syz0 as /devices/virtual/input/input1169 04:52:23 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:23 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 892.092104][T32443] input: syz0 as /devices/virtual/input/input1170 04:52:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x7fe, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5b, 0x0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x400000}) 04:52:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:52:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x1000000}) 04:52:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}}, 0x1c, 0x0}], 0x1, 0x0) [ 892.522382][ T407] input: syz0 as /devices/virtual/input/input1171 04:52:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 892.603614][ T448] input: syz0 as /devices/virtual/input/input1172 04:52:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101000, 0x0) sendto$llc(r1, &(0x7f0000000080)="b6558ec4263832f0c5fc9d21541728c49aed0090db7f468998d951b546c43d914d6be74112234a4ad065cabf77f8362cde916a35b8f78f369526b7344646fdf1945568b2189b710382ecdd2da9be02b698f7449f1a92eb5fa0e839bb59f74651a27eeb3a3672d7e509f3a64920e964b27fa4572a", 0x74, 0x10, 0x0, 0x0) r2 = dup(r0) write$uinput_user_dev(r2, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000480)='syz0\x00', 0xffffffffffffffff}, 0x30) r4 = getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) getgroups(0x3, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0x0]) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f00000002c0)) tkill(r4, 0xd) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={r4, r5, r6}, 0xc) 04:52:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x2000000}) 04:52:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x3000000}) [ 892.922577][ T782] input: syz0 as /devices/virtual/input/input1173 04:52:24 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:24 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc00f0004900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000040)=""/171) 04:52:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x12, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x4000000}) 04:52:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 893.315458][ T1232] input: syz0 as /devices/virtual/input/input1174 04:52:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x13, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 893.439989][ T1232] input: syz0 as /devices/virtual/input/input1175 04:52:25 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000fbdbdf250f000000080002000400040008000600040002001c000200080001000000000004000400080002000000000004000400700004000c"], 0x1}}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:52:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x5000000}) 04:52:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x14, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:25 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 04:52:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x6000000}) 04:52:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x15, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:25 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x301]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:25 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:26 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x100, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0xa, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [], 0x1}}) 04:52:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x7000000}) 04:52:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x16, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:26 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="11c5504f92e971251c060000006281fcba044fedecec0df2e5c986529e0fa7bfc3242c8c9020c504afd44c4f7982bb8dc9abc6297c42235fe93f9d4493ff69bd0c1430f6fee0ab8a5367b8e0fa1f6d6c74118630a860757c11fcd8c3361a0ea0e401bfd02fea597134ee9064ef80a0fa000000000000000000abdc7adfac7742c341646eef87f31fbc1cf8e9ed51e74ab7262287bb3dc3ecab0000"], 0x9b) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 04:52:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x8000000}) 04:52:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x17, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c8]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:26 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:26 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x3f000000}) 04:52:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x18, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:27 executing program 3: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10053, r0, 0x0) 04:52:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x40000000}) 04:52:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x19, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc00000e4900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) [ 895.527776][ T3668] debugfs: File '3524' in directory 'proc' already present! 04:52:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xf6ffffff}) 04:52:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1a, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) [ 895.623428][ T3668] debugfs: File '3524' in directory 'proc' already present! 04:52:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:27 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x42000200) socket$nl_route(0x10, 0x3, 0x0) r0 = gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) tkill(r0, 0x2e) 04:52:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1b, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 895.911125][ T4034] IPVS: ftp: loaded support on port[0] = 21 04:52:27 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xfcfdffff}) 04:52:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1c, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:27 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 896.150495][ T4300] IPVS: ftp: loaded support on port[0] = 21 04:52:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xfdfdffff}) 04:52:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00'}, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1d, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xfeffffff}) 04:52:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00'}, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1e, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 896.801573][ T4948] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present 04:52:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00'}, 0x4, 0x0, 0x81, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xfffffdfc}) 04:52:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:28 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}}, 0x1c, 0x0}], 0x1, 0x0) [ 897.047856][ T5200] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present 04:52:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:28 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0505510, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:29 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xfffffdfd}) 04:52:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:29 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 04:52:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x2f, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:29 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xfffffff6}) 04:52:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3c, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000740)='/dev/vcsa#\x00', 0x1000000000, 0x800) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x105000, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, &(0x7f0000000340)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x6) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000540)=""/204, &(0x7f00000004c0)=0xcc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x80000) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000440)={'ip6gre0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x3, 0x4, @tid=0xffffffffffffffff}, 0x0) mmap(&(0x7f0000005000/0x2000)=nil, 0x2000, 0x8, 0x40008031, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000400)=""/44, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='timers\x00\xd8\x8a\x9a^m\x10R\f\xcb!\xa8!?\x94\b\x88\xf6\x0e\x94~9l\x033\xef\x8f\xb4\'l\\\xe1') tee(r4, r3, 0x5, 0x9) 04:52:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:29 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x30, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0xfffffffe}) 04:52:29 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:29 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x225c17d03}) 04:52:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x5c, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:30 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="11dca5055e0bcfe47bf070") ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x44, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="116348400000000000000000000000000000000000000000010096ac0000000000004290ded71222e05e97d210d440fb5000000000012f0000000018", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/24]], 0x2, 0x70e000, 0x0}) 04:52:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 898.448843][ T6505] debugfs: File '6504' in directory 'proc' already present! 04:52:30 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 898.523839][ T6505] debugfs: File '6504' in directory 'proc' already present! 04:52:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='\\oquota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) r2 = dup2(0xffffffffffffffff, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r3, 0x5421, &(0x7f0000000540)=0xffffffff) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r2, 0xffffffffffffffff, 0x0) 04:52:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x1000000000000}) 04:52:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) [ 898.769304][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:30 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:30 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='n\\quota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) r2 = dup2(0xffffffffffffffff, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r3, 0x5421, &(0x7f0000000540)=0xffffffff) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r2, 0xffffffffffffffff, 0x0) 04:52:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x40000000000000}) 04:52:30 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 899.168406][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noq\\ota'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x100000000000000}) 04:52:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noqu\\ta'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) r2 = dup2(0xffffffffffffffff, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r3, 0x5421, &(0x7f0000000540)=0xffffffff) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r2, 0xffffffffffffffff, 0x0) 04:52:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x200000000000000}) [ 899.717591][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc805]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquo\\a'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:31 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x300000000000000}) 04:52:31 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) r2 = dup2(0xffffffffffffffff, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r3, 0x5421, &(0x7f0000000540)=0xffffffff) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) dup3(r2, 0xffffffffffffffff, 0x0) 04:52:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0000000f00071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquot\\'}, {@nouser_xattr='nouser_xattr'}]}) 04:52:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x37dc12502000000}) [ 900.390739][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='\\ouser_xattr'}]}) 04:52:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="fc0000024900071f8a092504090007000aab4300034000000000e293210001c000000000000000000000ffff0000000000001ec28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f07f70cce190a60aa47e9883997f391064e763bac4a110ed4da20028f6f380f5bd92c83170e5bba4a463a1e00566f72cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e", 0xfc) 04:52:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r2, 0x5421, &(0x7f0000000540)=0xffffffff) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 04:52:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x400000000000000}) 04:52:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='n\\user_xattr'}]}) 04:52:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) [ 900.801409][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r2, 0x5421, &(0x7f0000000540)=0xffffffff) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 04:52:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x500000000000000}) 04:52:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='no\\ser_xattr'}]}) 04:52:32 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:32 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 901.187458][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r2, 0x5421, &(0x7f0000000540)=0xffffffff) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 04:52:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x600000000000000}) 04:52:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nou#er_xattr'}]}) 04:52:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20480]}}, 0x1c, 0x0}], 0x1, 0x0) [ 901.480315][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$int_in(r2, 0x5421, &(0x7f0000000540)=0xffffffff) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 04:52:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x700000000000000}) 04:52:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) [ 901.755483][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nou%er_xattr'}]}) 04:52:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x8000000000001, 0x84) dup2(0xffffffffffffffff, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r2, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 04:52:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x800000000000000}) 04:52:33 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nou*er_xattr'}]}) [ 902.123662][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:52:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:34 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000004200)=[{&(0x7f0000000400)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c, 0x0}], 0x1, 0x0) 04:52:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}], [], 0x3f00000000000000}) 04:52:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000280)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 04:52:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="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", 0xfc) 04:52:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000440)={[{@noquota='noquota'}, {@nouser_xattr='nou+er_xattr'}]}) [ 1039.731398][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 124s! [syz-executor.3:10366] [ 1039.740122][ C0] Modules linked in: [ 1039.744007][ C0] irq event stamp: 0 [ 1039.747896][ C0] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 1039.755004][ C0] hardirqs last disabled at (0): [] copy_process+0x1815/0x6b00 [ 1039.764112][ C0] softirqs last enabled at (0): [] copy_process+0x18bc/0x6b00 [ 1039.773209][ C0] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 1039.780313][ C0] CPU: 0 PID: 10366 Comm: syz-executor.3 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1039.790104][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1039.800171][ C0] RIP: 0010:check_memory_region+0x104/0x1a0 [ 1039.806069][ C0] Code: 00 eb 0c 49 83 c0 01 4c 89 c8 4d 39 c8 74 10 41 80 38 00 74 ee 4b 8d 44 25 00 4d 85 c0 75 31 49 89 d9 49 29 c1 e9 68 ff ff ff <5b> b8 01 00 00 00 41 5c 41 5d 5d c3 4d 85 c9 74 ef 4d 01 e1 eb 09 [ 1039.825675][ C0] RSP: 0018:ffff8880ae8091d8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1039.834089][ C0] RAX: ffffed101470ba1a RBX: ffffed101470ba1a RCX: ffffffff8159a3d7 [ 1039.842057][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880a385d0c8 [ 1039.850021][ C0] RBP: ffff8880ae8091f0 R08: 1ffff1101470ba19 R09: ffffed101470ba1a [ 1039.857989][ C0] R10: ffffed101470ba19 R11: ffff8880a385d0cb R12: ffffed101470ba19 [ 1039.865963][ C0] R13: 0000000000000003 R14: ffffed101470ba19 R15: 0000000000000001 [ 1039.873927][ C0] FS: 000055555698b940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1039.882844][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1039.889414][ C0] CR2: 0000001b2d12f000 CR3: 0000000090ec0000 CR4: 00000000001406f0 [ 1039.897380][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1039.905348][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1039.913324][ C0] Call Trace: [ 1039.916598][ C0] [ 1039.919448][ C0] __kasan_check_read+0x11/0x20 [ 1039.924293][ C0] native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 1039.930447][ C0] ? __pv_queued_spin_lock_slowpath+0xd10/0xd10 [ 1039.936680][ C0] ? mark_held_locks+0xf0/0xf0 [ 1039.941440][ C0] do_raw_spin_lock+0x20e/0x2e0 [ 1039.946280][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 1039.951206][ C0] ? lock_acquire+0x190/0x410 [ 1039.955878][ C0] ? release_sock+0x20/0x1c0 [ 1039.960461][ C0] ? __kasan_check_read+0x11/0x20 [ 1039.965482][ C0] _raw_spin_lock_bh+0x3b/0x50 [ 1039.970236][ C0] ? release_sock+0x20/0x1c0 [ 1039.974821][ C0] release_sock+0x20/0x1c0 [ 1039.979303][ C0] wait_on_pending_writer+0x20f/0x420 [ 1039.984680][ C0] ? tls_init+0x560/0x560 [ 1039.989003][ C0] ? __kasan_check_read+0x11/0x20 [ 1039.994029][ C0] ? prepare_to_wait_exclusive+0x320/0x320 [ 1039.999837][ C0] ? lock_downgrade+0x920/0x920 [ 1040.004687][ C0] tls_sk_proto_cleanup+0x2c5/0x3e0 [ 1040.009878][ C0] ? wait_on_pending_writer+0x420/0x420 [ 1040.015420][ C0] ? trace_hardirqs_on+0x67/0x240 [ 1040.020437][ C0] ? drain_stock.isra.0+0x1cb/0x240 [ 1040.025629][ C0] tls_sk_proto_unhash+0x90/0x3f0 [ 1040.030676][ C0] tcp_set_state+0x5b9/0x7d0 [ 1040.035267][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1040.041503][ C0] ? __sk_mem_reduce_allocated+0x1b0/0x560 [ 1040.047316][ C0] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 1040.052773][ C0] ? __sk_mem_reclaim+0x55/0x70 [ 1040.057619][ C0] ? tcp_write_queue_purge+0x5d8/0x1310 [ 1040.063166][ C0] ? lock_downgrade+0x920/0x920 [ 1040.068014][ C0] tcp_done+0xe2/0x320 [ 1040.072082][ C0] tcp_reset+0x132/0x500 [ 1040.076319][ C0] tcp_validate_incoming+0xa2d/0x1660 [ 1040.081693][ C0] tcp_rcv_established+0x6b5/0x1e70 [ 1040.086883][ C0] ? tcp_data_queue+0x4860/0x4860 [ 1040.091908][ C0] tcp_v6_do_rcv+0x41e/0x12c0 [ 1040.096580][ C0] tcp_v6_rcv+0x31f1/0x3500 [ 1040.101086][ C0] ? tcp_v6_syn_recv_sock+0x2290/0x2290 [ 1040.106628][ C0] ? nf_confirm+0x360/0x4d0 [ 1040.111128][ C0] ? mark_held_locks+0xf0/0xf0 [ 1040.115891][ C0] ip6_protocol_deliver_rcu+0x2fe/0x1660 [ 1040.121524][ C0] ip6_input_finish+0x84/0x170 [ 1040.126278][ C0] ip6_input+0xe4/0x3f0 [ 1040.130426][ C0] ? ip6_input_finish+0x170/0x170 [ 1040.135441][ C0] ? __kasan_check_read+0x11/0x20 [ 1040.140467][ C0] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 1040.146356][ C0] ? lock_downgrade+0x920/0x920 [ 1040.151203][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1040.157439][ C0] ip6_rcv_finish+0x1de/0x2f0 [ 1040.162109][ C0] ipv6_rcv+0x10e/0x420 [ 1040.166256][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 1040.171708][ C0] ? lock_downgrade+0x920/0x920 [ 1040.176551][ C0] ? lock_downgrade+0x920/0x920 [ 1040.181398][ C0] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 1040.187280][ C0] ? trace_hardirqs_off+0x62/0x240 [ 1040.192386][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 1040.197855][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 1040.203769][ C0] ? __netif_receive_skb_core+0x3060/0x3060 [ 1040.209655][ C0] ? lock_acquire+0x190/0x410 [ 1040.214331][ C0] ? process_backlog+0x195/0x750 [ 1040.219262][ C0] __netif_receive_skb+0x2c/0x1d0 [ 1040.224281][ C0] process_backlog+0x206/0x750 [ 1040.229036][ C0] ? lock_acquire+0x190/0x410 [ 1040.233707][ C0] ? clockevents_program_event+0x15a/0x370 [ 1040.239506][ C0] net_rx_action+0x508/0x10c0 [ 1040.244185][ C0] ? napi_complete_done+0x4b0/0x4b0 [ 1040.249400][ C0] ? sched_clock+0x2e/0x50 [ 1040.253814][ C0] ? kvm_clock_read+0x18/0x30 [ 1040.258505][ C0] ? inet_csk_listen_stop+0x1bc/0x850 [ 1040.263872][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.270236][ C0] __do_softirq+0x262/0x98c [ 1040.274734][ C0] ? inet_csk_listen_stop+0x1bc/0x850 [ 1040.280097][ C0] do_softirq_own_stack+0x2a/0x40 [ 1040.285103][ C0] [ 1040.288037][ C0] do_softirq.part.0+0x11a/0x170 [ 1040.292968][ C0] __local_bh_enable_ip+0x211/0x270 [ 1040.298159][ C0] inet_csk_listen_stop+0x1e0/0x850 [ 1040.303355][ C0] tcp_close+0xd5b/0x10e0 [ 1040.307677][ C0] ? ip_mc_drop_socket+0x211/0x270 [ 1040.312778][ C0] ? down_write+0xdf/0x150 [ 1040.317188][ C0] inet_release+0xed/0x200 [ 1040.321597][ C0] inet6_release+0x53/0x80 [ 1040.326008][ C0] __sock_release+0xce/0x280 [ 1040.330591][ C0] sock_close+0x1e/0x30 [ 1040.334740][ C0] __fput+0x2ff/0x890 [ 1040.338716][ C0] ? __sock_release+0x280/0x280 [ 1040.343558][ C0] ____fput+0x16/0x20 [ 1040.347533][ C0] task_work_run+0x145/0x1c0 [ 1040.352118][ C0] exit_to_usermode_loop+0x316/0x380 [ 1040.357399][ C0] do_syscall_64+0x65f/0x760 [ 1040.361992][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1040.367873][ C0] RIP: 0033:0x413511 [ 1040.371769][ C0] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1040.391364][ C0] RSP: 002b:00007ffc9f00ae60 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1040.399859][ C0] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000413511 [ 1040.407818][ C0] RDX: 0000000000000000 RSI: 00000000000016bf RDI: 0000000000000006 [ 1040.415776][ C0] RBP: 0000000000000001 R08: 00000000943af6c0 R09: ffffffffffffffff [ 1040.423737][ C0] R10: 00007ffc9f00af40 R11: 0000000000000293 R12: 000000000075c9a0 [ 1040.431728][ C0] R13: 000000000075c9a0 R14: 00000000007609c0 R15: ffffffffffffffff [ 1040.439706][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1040.445559][ C1] NMI backtrace for cpu 1 [ 1040.445566][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.3.0-rc1-next-20190726 #53 [ 1040.445572][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.445576][ C1] RIP: 0010:__kasan_check_read+0x0/0x20 [ 1040.445587][ C1] Code: e8 99 48 af ff 0f 0b 4c 8b 4d d0 e9 27 ee ff ff 48 8b 73 58 89 c2 48 c7 c7 c8 a9 89 88 f7 da e8 7a 48 af ff e9 da ee ff ff 90 <55> 89 f6 31 d2 48 89 e5 48 8b 4d 08 e8 cf 26 00 00 5d c3 0f 1f 00 [ 1040.445591][ C1] RSP: 0018:ffff8880ae909b40 EFLAGS: 00000202 [ 1040.445600][ C1] RAX: 0000000000000000 RBX: ffff8880a385d0c8 RCX: ffffffff8159a3d7 [ 1040.445605][ C1] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880a385d0c8 [ 1040.445610][ C1] RBP: ffff8880ae909c08 R08: 1ffff1101470ba19 R09: ffffed101470ba1a [ 1040.445615][ C1] R10: ffffed101470ba19 R11: ffff8880a385d0cb R12: 0000000000000001 [ 1040.445620][ C1] R13: 0000000000000003 R14: ffffed101470ba19 R15: 0000000000000001 [ 1040.445626][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 1040.445630][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1040.445635][ C1] CR2: 00000000023f4e80 CR3: 00000000887d5000 CR4: 00000000001406e0 [ 1040.445640][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1040.445646][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1040.445648][ C1] Call Trace: [ 1040.445651][ C1] [ 1040.445655][ C1] ? native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 1040.445659][ C1] ? __pv_queued_spin_lock_slowpath+0xd10/0xd10 [ 1040.445663][ C1] ? __enqueue_entity+0x142/0x390 [ 1040.445667][ C1] ? update_cfs_group+0x27c/0x3a0 [ 1040.445670][ C1] ? mark_held_locks+0xf0/0xf0 [ 1040.445674][ C1] ? debug_object_deactivate+0x1d9/0x320 [ 1040.445678][ C1] do_raw_spin_lock+0x20e/0x2e0 [ 1040.445681][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 1040.445685][ C1] ? lock_acquire+0x190/0x410 [ 1040.445688][ C1] ? tcp_write_timer+0x2b/0x1e0 [ 1040.445692][ C1] _raw_spin_lock+0x37/0x40 [ 1040.445695][ C1] ? tcp_write_timer+0x2b/0x1e0 [ 1040.445699][ C1] tcp_write_timer+0x2b/0x1e0 [ 1040.445702][ C1] call_timer_fn+0x1ac/0x780 [ 1040.445706][ C1] ? tcp_write_timer_handler+0x8d0/0x8d0 [ 1040.445710][ C1] ? msleep_interruptible+0x150/0x150 [ 1040.445713][ C1] ? trace_hardirqs_on+0x67/0x240 [ 1040.445717][ C1] ? __kasan_check_read+0x11/0x20 [ 1040.445721][ C1] ? tcp_write_timer_handler+0x8d0/0x8d0 [ 1040.445725][ C1] ? tcp_write_timer_handler+0x8d0/0x8d0 [ 1040.445729][ C1] run_timer_softirq+0x697/0x17a0 [ 1040.445732][ C1] ? add_timer+0x930/0x930 [ 1040.445735][ C1] ? kvm_clock_read+0x18/0x30 [ 1040.445739][ C1] ? kvm_sched_clock_read+0x9/0x20 [ 1040.445742][ C1] ? sched_clock+0x2e/0x50 [ 1040.445746][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 1040.445750][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.445755][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.445758][ C1] __do_softirq+0x262/0x98c [ 1040.445762][ C1] ? sched_clock_cpu+0x1b/0x1b0 [ 1040.445765][ C1] irq_exit+0x19b/0x1e0 [ 1040.445769][ C1] smp_apic_timer_interrupt+0x1a3/0x610 [ 1040.445772][ C1] apic_timer_interrupt+0xf/0x20 [ 1040.445775][ C1] [ 1040.445779][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 1040.445790][ C1] Code: e8 a6 6d fa eb 8a 90 90 90 90 90 90 e9 07 00 00 00 0f 00 2d f4 9f 48 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d e4 9f 48 00 fb f4 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 e8 7e f6 20 fa e8 19 [ 1040.445794][ C1] RSP: 0018:ffff8880a98dfd68 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 1040.445803][ C1] RAX: 1ffffffff11a5e87 RBX: ffff8880a98d2340 RCX: 1ffffffff134be76 [ 1040.445808][ C1] RDX: dffffc0000000000 RSI: ffffffff817850ae RDI: ffffffff873f8c1c [ 1040.445813][ C1] RBP: ffff8880a98dfd98 R08: ffff8880a98d2340 R09: ffffed101531a469 [ 1040.445818][ C1] R10: ffffed101531a468 R11: ffff8880a98d2347 R12: dffffc0000000000 [ 1040.445829][ C1] R13: ffffffff89a5c1c0 R14: 0000000000000000 R15: 0000000000000001 [ 1040.445833][ C1] ? trace_hardirqs_on+0x5e/0x240 [ 1040.445836][ C1] ? default_idle+0x1c/0x360 [ 1040.445840][ C1] ? default_idle+0x4e/0x360 [ 1040.445843][ C1] arch_cpu_idle+0xa/0x10 [ 1040.445847][ C1] default_idle_call+0x84/0xb0 [ 1040.445850][ C1] do_idle+0x413/0x760 [ 1040.445853][ C1] ? arch_cpu_idle_exit+0x80/0x80 [ 1040.445857][ C1] cpu_startup_entry+0x1b/0x20 [ 1040.445860][ C1] start_secondary+0x2f4/0x410 [ 1040.445864][ C1] ? set_cpu_sibling_map+0x2180/0x2180 [ 1040.445868][ C1] secondary_startup_64+0xa4/0xb0 [ 1040.445895][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 1040.889858][ C0] CPU: 0 PID: 10366 Comm: syz-executor.3 Tainted: G L 5.3.0-rc1-next-20190726 #53 [ 1040.900341][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1040.910383][ C0] Call Trace: [ 1040.913662][ C0] [ 1040.916518][ C0] dump_stack+0x172/0x1f0 [ 1040.920840][ C0] panic+0x2dc/0x755 [ 1040.924729][ C0] ? add_taint.cold+0x16/0x16 [ 1040.929400][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1040.935132][ C0] ? printk_safe_flush+0xf2/0x140 [ 1040.940152][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1040.946389][ C0] ? watchdog_timer_fn.cold+0x5/0x2b [ 1040.951665][ C0] ? watchdog_timer_fn+0x56e/0x5c0 [ 1040.956769][ C0] watchdog_timer_fn.cold+0x16/0x2b [ 1040.961962][ C0] __hrtimer_run_queues+0x364/0xe40 [ 1040.967156][ C0] ? lockup_detector_update_enable+0xa0/0xa0 [ 1040.973132][ C0] ? hrtimer_start_range_ns+0xcb0/0xcb0 [ 1040.978667][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1040.984405][ C0] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 1040.990466][ C0] hrtimer_interrupt+0x314/0x770 [ 1040.995412][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 1041.000948][ C0] apic_timer_interrupt+0xf/0x20 [ 1041.005881][ C0] RIP: 0010:check_memory_region+0x104/0x1a0 [ 1041.011771][ C0] Code: 00 eb 0c 49 83 c0 01 4c 89 c8 4d 39 c8 74 10 41 80 38 00 74 ee 4b 8d 44 25 00 4d 85 c0 75 31 49 89 d9 49 29 c1 e9 68 ff ff ff <5b> b8 01 00 00 00 41 5c 41 5d 5d c3 4d 85 c9 74 ef 4d 01 e1 eb 09 [ 1041.031363][ C0] RSP: 0018:ffff8880ae8091d8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1041.039765][ C0] RAX: ffffed101470ba1a RBX: ffffed101470ba1a RCX: ffffffff8159a3d7 [ 1041.047730][ C0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880a385d0c8 [ 1041.055691][ C0] RBP: ffff8880ae8091f0 R08: 1ffff1101470ba19 R09: ffffed101470ba1a [ 1041.063652][ C0] R10: ffffed101470ba19 R11: ffff8880a385d0cb R12: ffffed101470ba19 [ 1041.071612][ C0] R13: 0000000000000003 R14: ffffed101470ba19 R15: 0000000000000001 [ 1041.079586][ C0] ? apic_timer_interrupt+0xa/0x20 [ 1041.084692][ C0] ? native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 1041.091017][ C0] __kasan_check_read+0x11/0x20 [ 1041.095858][ C0] native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 1041.102000][ C0] ? __pv_queued_spin_lock_slowpath+0xd10/0xd10 [ 1041.108234][ C0] ? mark_held_locks+0xf0/0xf0 [ 1041.112993][ C0] do_raw_spin_lock+0x20e/0x2e0 [ 1041.117832][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 1041.122758][ C0] ? lock_acquire+0x190/0x410 [ 1041.127428][ C0] ? release_sock+0x20/0x1c0 [ 1041.132007][ C0] ? __kasan_check_read+0x11/0x20 [ 1041.137025][ C0] _raw_spin_lock_bh+0x3b/0x50 [ 1041.141778][ C0] ? release_sock+0x20/0x1c0 [ 1041.146358][ C0] release_sock+0x20/0x1c0 [ 1041.150768][ C0] wait_on_pending_writer+0x20f/0x420 [ 1041.156132][ C0] ? tls_init+0x560/0x560 [ 1041.160458][ C0] ? __kasan_check_read+0x11/0x20 [ 1041.165474][ C0] ? prepare_to_wait_exclusive+0x320/0x320 [ 1041.171274][ C0] ? lock_downgrade+0x920/0x920 [ 1041.176125][ C0] tls_sk_proto_cleanup+0x2c5/0x3e0 [ 1041.181318][ C0] ? wait_on_pending_writer+0x420/0x420 [ 1041.186860][ C0] ? trace_hardirqs_on+0x67/0x240 [ 1041.191876][ C0] ? drain_stock.isra.0+0x1cb/0x240 [ 1041.197071][ C0] tls_sk_proto_unhash+0x90/0x3f0 [ 1041.202090][ C0] tcp_set_state+0x5b9/0x7d0 [ 1041.206675][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1041.212905][ C0] ? __sk_mem_reduce_allocated+0x1b0/0x560 [ 1041.218703][ C0] ? tcp_alloc_md5sig_pool+0x4a0/0x4a0 [ 1041.224151][ C0] ? __sk_mem_reclaim+0x55/0x70 [ 1041.229001][ C0] ? tcp_write_queue_purge+0x5d8/0x1310 [ 1041.234539][ C0] ? lock_downgrade+0x920/0x920 [ 1041.239380][ C0] tcp_done+0xe2/0x320 [ 1041.243448][ C0] tcp_reset+0x132/0x500 [ 1041.247685][ C0] tcp_validate_incoming+0xa2d/0x1660 [ 1041.253056][ C0] tcp_rcv_established+0x6b5/0x1e70 [ 1041.258250][ C0] ? tcp_data_queue+0x4860/0x4860 [ 1041.263295][ C0] tcp_v6_do_rcv+0x41e/0x12c0 [ 1041.267970][ C0] tcp_v6_rcv+0x31f1/0x3500 [ 1041.272478][ C0] ? tcp_v6_syn_recv_sock+0x2290/0x2290 [ 1041.278018][ C0] ? nf_confirm+0x360/0x4d0 [ 1041.282518][ C0] ? mark_held_locks+0xf0/0xf0 [ 1041.287290][ C0] ip6_protocol_deliver_rcu+0x2fe/0x1660 [ 1041.292924][ C0] ip6_input_finish+0x84/0x170 [ 1041.297684][ C0] ip6_input+0xe4/0x3f0 [ 1041.301829][ C0] ? ip6_input_finish+0x170/0x170 [ 1041.306855][ C0] ? __kasan_check_read+0x11/0x20 [ 1041.311978][ C0] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 1041.317863][ C0] ? lock_downgrade+0x920/0x920 [ 1041.322708][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1041.328941][ C0] ip6_rcv_finish+0x1de/0x2f0 [ 1041.333607][ C0] ipv6_rcv+0x10e/0x420 [ 1041.337755][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 1041.343202][ C0] ? lock_downgrade+0x920/0x920 [ 1041.348041][ C0] ? lock_downgrade+0x920/0x920 [ 1041.352885][ C0] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 1041.358862][ C0] ? trace_hardirqs_off+0x62/0x240 [ 1041.363963][ C0] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 1041.369418][ C0] __netif_receive_skb_one_core+0x113/0x1a0 [ 1041.375304][ C0] ? __netif_receive_skb_core+0x3060/0x3060 [ 1041.381193][ C0] ? lock_acquire+0x190/0x410 [ 1041.385860][ C0] ? process_backlog+0x195/0x750 [ 1041.390792][ C0] __netif_receive_skb+0x2c/0x1d0 [ 1041.395808][ C0] process_backlog+0x206/0x750 [ 1041.400566][ C0] ? lock_acquire+0x190/0x410 [ 1041.405237][ C0] ? clockevents_program_event+0x15a/0x370 [ 1041.411036][ C0] net_rx_action+0x508/0x10c0 [ 1041.415709][ C0] ? napi_complete_done+0x4b0/0x4b0 [ 1041.420900][ C0] ? sched_clock+0x2e/0x50 [ 1041.425306][ C0] ? kvm_clock_read+0x18/0x30 [ 1041.430068][ C0] ? inet_csk_listen_stop+0x1bc/0x850 [ 1041.435431][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.441663][ C0] __do_softirq+0x262/0x98c [ 1041.446161][ C0] ? inet_csk_listen_stop+0x1bc/0x850 [ 1041.451522][ C0] do_softirq_own_stack+0x2a/0x40 [ 1041.456537][ C0] [ 1041.459466][ C0] do_softirq.part.0+0x11a/0x170 [ 1041.464393][ C0] __local_bh_enable_ip+0x211/0x270 [ 1041.469580][ C0] inet_csk_listen_stop+0x1e0/0x850 [ 1041.474773][ C0] tcp_close+0xd5b/0x10e0 [ 1041.479093][ C0] ? ip_mc_drop_socket+0x211/0x270 [ 1041.484191][ C0] ? down_write+0xdf/0x150 [ 1041.488607][ C0] inet_release+0xed/0x200 [ 1041.493019][ C0] inet6_release+0x53/0x80 [ 1041.497429][ C0] __sock_release+0xce/0x280 [ 1041.502009][ C0] sock_close+0x1e/0x30 [ 1041.506156][ C0] __fput+0x2ff/0x890 [ 1041.510132][ C0] ? __sock_release+0x280/0x280 [ 1041.514974][ C0] ____fput+0x16/0x20 [ 1041.518946][ C0] task_work_run+0x145/0x1c0 [ 1041.523531][ C0] exit_to_usermode_loop+0x316/0x380 [ 1041.528805][ C0] do_syscall_64+0x65f/0x760 [ 1041.533398][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1041.539279][ C0] RIP: 0033:0x413511 [ 1041.543171][ C0] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1041.562764][ C0] RSP: 002b:00007ffc9f00ae60 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1041.571171][ C0] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000413511 [ 1041.579228][ C0] RDX: 0000000000000000 RSI: 00000000000016bf RDI: 0000000000000006 [ 1041.587206][ C0] RBP: 0000000000000001 R08: 00000000943af6c0 R09: ffffffffffffffff [ 1041.595178][ C0] R10: 00007ffc9f00af40 R11: 0000000000000293 R12: 000000000075c9a0 [ 1041.603143][ C0] R13: 000000000075c9a0 R14: 00000000007609c0 R15: ffffffffffffffff [ 1041.612378][ C0] Kernel Offset: disabled [ 1041.616713][ C0] Rebooting in 86400 seconds..