[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 26.885110] kauditd_printk_skb: 7 callbacks suppressed [ 26.885122] audit: type=1800 audit(1540868940.502:29): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.914958] audit: type=1800 audit(1540868940.502:30): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 48.069427] sshd (5674) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.123' (ECDSA) to the list of known hosts. 2018/10/30 03:09:28 fuzzer started 2018/10/30 03:09:30 dialing manager at 10.128.0.26:45973 2018/10/30 03:09:30 syscalls: 1 2018/10/30 03:09:30 code coverage: enabled 2018/10/30 03:09:30 comparison tracing: enabled 2018/10/30 03:09:30 setuid sandbox: enabled 2018/10/30 03:09:30 namespace sandbox: enabled 2018/10/30 03:09:30 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/30 03:09:30 fault injection: enabled 2018/10/30 03:09:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/30 03:09:30 net packed injection: enabled 2018/10/30 03:09:30 net device setup: enabled 03:12:26 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x8000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x4, 0x9, 0x6, 0x3}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x11f4, 0x8002, 0x6b5b, 0xfffffffffffffffa, 0x7f, 0x0, 0x3, r1}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x15, &(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000004c0)=0xe8) getgroups(0x7, &(0x7f0000000500)=[0xee01, 0xee00, 0x0, 0xee00, 0xee01, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000540)=0x0) r9 = geteuid() fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getpid() r12 = getuid() stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getpgid(0xffffffffffffffff) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)=0x0) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ec0)={0xffffffffffffffff, r0, 0x0, 0x1a, &(0x7f0000000e80)='posix_acl_accessppp0proc\'\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000000fc0)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001000)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001100)=0xe8) fstat(r0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000011c0)={0x0}, &(0x7f0000001200)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000001340)=0xe8) r28 = getgid() r29 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001480)=0xe8) lstat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000045c0)={0x0, r0, 0x0, 0x5, &(0x7f0000004580)='eth1\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004600)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000004700)=0xe8) getresgid(&(0x7f0000004740), &(0x7f0000004780), &(0x7f00000047c0)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004c00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004c40)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000004d40)=0xe8) r37 = getegid() sendmmsg$unix(r0, &(0x7f0000004dc0)=[{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000200)="0e8385850128033f91ee149fe3e3aa6214e17dd91638", 0x16}], 0x1, &(0x7f0000000600)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}], 0xa8, 0x4004000}, {&(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000740)="e0b61daf610126d0f48a7b4af791b3125754dc0e5aa20144bceb1009f0d9f42aae7e6f2deb3613ede6c6ae5668cb6ba4306a0d8f0e76e66f965dd38666de3de6b7eca763b081a4367b04b7e9ebef97f6340673f2ab086906faf6b7f1f9670cba9437f9479a1c564d89705b3961035a89d7caa9e36ee514506e2093fb9630fcbd6c73e6fd2f46547fae500e451083d3d3fe9da68ae04b6ca55493e8183efaa8e6dab00d0de5e98817ee0fe803d77b03", 0xaf}], 0x1, &(0x7f0000000c00)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}], 0xa8, 0x800}, {&(0x7f0000000cc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000d40), 0x0, 0x0, 0x0, 0x4}, {&(0x7f0000000d80)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000e00)="e308e73152df4f89303bb51a870b", 0xe}], 0x1, &(0x7f0000001580)=[@cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x130, 0x1}, {&(0x7f00000016c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002ac0)=[{&(0x7f0000001740)="deff69e759647c8932f72fe1e38bcb173122520d31334f9a8762339032fae66a9f56130b306a3839f4a46b7e20220641e61689b5f9ab0008c73ce2aa5f369d80bc016cea8dd463f9907a613c1a419f11be8591f17fab6267ba71d4338936014c7ced516fc9e4d345c0dff9f43f680e68b138", 0x72}, {&(0x7f00000017c0)="155519", 0x3}, {&(0x7f0000001800)="a4c03aac8ab58a21f13630675f3b49cf9d3592c2bd8e6773ef498eaa6973d51a5feae6bd42570900b876cf3a3ff98ca1ebe59eccd983ea59290562e026464d7a65a2cf8dc22747bfbada3b06013b02623fe60a77d214ac6cf786a92e1a73a0cac611b5624062069b8309052ef4e0d42807bfef6d28fd6d9ea45ad7032ff3053823ba2f4e5cb23840421dffb507846b405a39b76f7dd923e22067dc556ad863aa43e2ce8802485721339cf8b3cba6a2f2ac09a14d23fc62b2adc9abbde2ac4bab2be425d873fd6a6238d4452d2216aa45cadbb115ed09ed3d220515df8a33e7e2a3109fc0af0c77dab6e6773181de5f93c529", 0xf2}, {&(0x7f0000001900)="b20aae8fbccbc58bca7852c591b4e380c0fc246e5095f52264d99da2db62b9c740b37092a4ad1cab4573ac2751", 0x2d}, {&(0x7f0000001940)="1a79732ca6a8de1543b0a85f68d056f0ff90da9df19f39cdaf7c70cf984af57a5517438b103ad9a1aac97ab87cfc885a77a597f2f1f322d0218829aff120c50b47664f6fc1a4b15fdf3fa39845586585", 0x50}, {&(0x7f00000019c0)="5dd85f77a3a7bdd1c3fb1d6f9f53c80ce89a5a1c49a50ec8ee01e672dc67bfb2d88560918415ff50641e3dace69f325711f5aa12156d8bfbd1be7981304f4924d928a1a917bf692a43407be6f6b90d92294fc856b873d51c45be9402a867af3f9087e381d2c1b45fdff14324f4ec73d5", 0x70}, {&(0x7f0000001a40)="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", 0x1000}, {&(0x7f0000002a40)="8fb1be7188640cb5ebf9fd08bea1e5dd9a4d35974f4b68b133fb3ab842789a4a7135cef7047096f3480213779b4bc5e25d51cdd63a3930d72d906dbc7b40af5fe3b27bfc0a614b35dae616e7184e6932133829470c7ea9f7499405ac44f5a4490bdc5c2ee2d6", 0x66}], 0x8, 0x0, 0x0, 0x40000}, {&(0x7f0000002b40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003f40)=[{&(0x7f0000002bc0)="b30d4788fec2dbdc7b8696b89b6683385be1ee02574284d70425e9d222c6e6f2dcc726bfc3570fcf44376274e6134d81c6aca23f5a427c00c94716f336597c2ee5f3d8e7ec8484262439541268c1aea0c84588e258bf25c3e16ac86efa306fc223eb8ea17b3355ee054e92a1c21cbf0b843d8f95609ab4b05dc9ccc2c3854eab081e8155c0bdca06b71a68107c717bb36575b2a78b22c7c484", 0x99}, {&(0x7f0000002c80)="b03f4b1a44af95549fd32b0b00bc14d130a58cb5f2568f7ba6854129964ca33c56d7525981c34dedd8f781f6d2002d6b73", 0x31}, {&(0x7f0000002cc0)="ff9086f5a130b0b70d1d15409b145320f5709434508e61e0ac3f0242f70e57a4f1e3458361d8a2f77ab8c4c87b079b763a3912249afaacc236b8a1713570d4edc988fa078ac43c0f4a98804d4cfde044b03ed3f26fc7a0a84407fff89dadda64b90c4c2cab02725e27f96ec5fda4fcb84af78d506ca22ab181f409adff7280c63b682ed7f229f4e8ea15be1ddf13c5f923f7bddb4a8ed66faad5c267068a84912903466329db1520d6db0fd0a0a52ec176dc0841b60673a8debe2fa888d3d54eeb2a11ada6bc", 0xc6}, {&(0x7f0000002dc0)="783ad16d765dedd4e6bfd96c12ba6c7af723a32b28c5855a93a4472850836ea8908d51369bf7e56f6f26f8c05a5807fc5f229e418e396c63ba90ea9e3a2a88edf07bd970ca45d40331a2890ec7adf31d9dcfd4b2237860d6e169923c0e3046bd468c37d94659bf5524de803ba3513c42ecee92c07f773169833b259c354672a594096e476faa04c5f71868c40504eb6f2e4bfc49565f2b798a25e9d9881509da5740293f", 0xa4}, {&(0x7f0000002e80)="5c02a052d9f0f817a833d6caf4e07b9c4366b1c76bb805337c895a479ac90c33d482f12d99cd05706e80cd5a84624b21da11fa141dce66da9493a8e52ded7c615850c209ba39aa59583950f5e3ee26f46d181b628333073cf0f5b165020401ba42c412fd312be360f2f98aa3931b1626325cc8189892d59bd642661ed39bebe971e934", 0x83}, {&(0x7f0000002f40)="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", 0x1000}], 0x6, &(0x7f0000003fc0), 0x0, 0x24040840}, {&(0x7f0000004000)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000004500)=[{&(0x7f0000004080)="6ccae5d0409f75ae66b0cae07d5e22b161aeb1d8d88e3e1ece2d0cd986d753b65c38f54ae912deaec35da4a29c25b291cad96515f2c03e2cca", 0x39}, {&(0x7f00000040c0)="e374baebff9c921c98d18b9e595667eda2fcfc73e69519877bd54c6b2d58de9f0430841233243d2fc6403e45200689da803b", 0x32}, {&(0x7f0000004100)="18a92fe04b25560f09257f1c354750fad715deeb04720ae29adc57286acfbed677b5cb585ec6d78d421d119261b860e9b2d4fdfa99353953e0a1ddf36c6789607fd272daae03c466c1a7dbe9d47f9d902dbc344b6fabb3702120f3043013", 0x5e}, {&(0x7f0000004180)="97996892039480da259b8701ef12f4777c88a3af9d51d036a115d700ebc3add4", 0x20}, {&(0x7f00000041c0)="f6a0fc574b3298630097514bcf5a09c15234b7a96ec4adcc54206d4c6bed010883cf23b21b45689e4a7391753ee91defd8a7cdd7e9b0539dba027555d2260444d996f248855809be7adedf94bae09d8086dec122430daf90443e913ae9083f2568795e5a4cdd660dbc29696ee8c5a34906639827dea6c442853298e0ed7dbfde5f6bbbaa209c5e8023d40a3fb3979795abc3c06628a8c7985d89a71c75fb064cc8bc61708991bb6b635e007fc3ae22674cbcee6a08cd2e179c27d1985f6c5a30a7dfc213d2e709d7879a965e3eeec2a6e98528a2414b30f757c275635ef2b109deba46d7b6631c905fed48c0b33acfe42b3e03cbfd2bbf4e2617c4", 0xfb}, {&(0x7f00000042c0)="59690737cda4c3a23926318be5f0e79a673ad920fefa272259feb586d840be5769770ca316cec1b83c6050aaa2f8dcf95055743a644af6010796bf81a60a890e01af82c5fd483872c30162f804d478d4867fd3d8248a6fd4ef35f7cf69f389bb58fddcb50e515794d9156b7daa5b1fb949df9a16df0f252c5ac4306d8a1820c19d32872531c534b72d9c953c8ed0d63766d2bc0e2f184fc2388432b49ee3a5c98a57d3d78e70b05b8b3b53498944ae9193d7d76716b7d87633b767d64496994a2af7b4b8e94748a7d25f9baf5bf6d68e329b6fecffc99cac674467b4f8ae086ecf0dcb4095", 0xe5}, {&(0x7f00000043c0)="67653ea7bd4d793dddb57be89ce1b40d8b865f1ec3bf757e922eaa02cb45e80ebd2006870176f8dcdff39f408bae45a196a68dbaeb64c25a74163d9e86bfa1020c2d7e531606fdf3a3d922bf1437efb4bc6c74a9c7c3907661e35908ba3e6f92880986d1751e8611b1b04dd39534ea4e49c3ec25a6d89ae2d07d20d03070bc0838efcc481a394d927caa32945e7d1505612e36d9ca164921c2cdafbec9fb548dcba538c1e3c8013db076d955fc1a758854e89e0a9161f7da7b4068ae56b57158", 0xc0}, {&(0x7f0000004480)="124858c34249103595fad17d60eccf7ae584724deeb6fb5136c162943e84efe1d1452d5b3c93315b4ce0c7ee0de95891348f4874956d92072b971f65fb2c8b1871f4ac45a0047bd18ca6bed98f59c5eee6c432487f89a572dc5925727078efe4609e", 0x62}], 0x8, &(0x7f0000004800)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r32, r33, r34}], 0x58, 0x5}, {&(0x7f0000004880)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004bc0)=[{&(0x7f0000004900)="1eca57931507ee76a589d990b60a894e48631f355166b1d8d9d1a70f9a7636071308c0fc5c248a26decb6cd603ec333bd79e358d3989b7e1a2df09357e5a4f188c38c689608d7782cc05d1131c4026c544e652665776584d2541a42c96cd51123145e68fef02b45d6ce965eef96e1b568d11147f1ca97f9420056680db6729a03743e6e29e805f3fb7549975d0f7d7535ffc571a65cbac0f782b72c4dc", 0x9d}, {&(0x7f00000049c0)="8894319ca528e0c629f637d1", 0xc}, {&(0x7f0000004a00)="98d4e0b67ae576c208a3cef5ef14ee7c74d22bf00afd93e0d238d222982293cc9e319809887236390bae4130b2d663786a304a4cd72692a53b1c7ddff9908e058feca1bcc6274fe83622c0ee31e3d41bf873c8bdfa6dca02353a36d8e8e6175a4824de6c5a9f4385418cac86cc34902d49628053d4f2beda5a9f9d621d717ecf3ec25177538465aa5c9cfc527d88b43906d10b8883d6fc76dc88", 0x9a}, {&(0x7f0000004ac0)="05fb7a2048fdf4cfc1505ac09d05526490c773bb23c1fc57c785ac31173c8ac5ee647c0fdc2c99735a953a754035eba39f6f487152a8879cd40448892581fc41fb1bd0d8f7edb53e6251e271880f18dcbee02d6d4d317ab70635469293ea78607bd8a797ceeb286f209509b10b57527465caebe7789ccfc3643e08f698ec438b5ca7f6a70bf291eb3788ab51c7e418c39c9d645844ef7299e2372520cfe08aaf3c7bd655c356bcbc50157706d9a3eb77e070789efdc0b4d3ed8197c15682a2423e6aa67d4cd15e0c738b0a264f64895ee944b3c189ece93e54023379f801a535c9b62396e02d1a5f190f17", 0xeb}], 0x4, &(0x7f0000004d80)=[@cred={0x20, 0x1, 0x2, r35, r36, r37}], 0x20, 0x4000000}], 0x8, 0x8000) [ 233.184190] IPVS: ftp: loaded support on port[0] = 21 03:12:26 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20080, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0xee4, &(0x7f0000000080)=0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) capget(&(0x7f0000000140)={0x200f1526, r1}, &(0x7f0000000180)={0x5, 0x3, 0x2, 0x0, 0xff, 0x1}) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x1, 0x1, 0x7, 0x6, 0xd2, "bdfb2c53c3c69556537707a9c12fcec7c14e8820728b9787911110b3a25fbdadccf2c19b729674652fa0646d7bda68c708a19ed3137f563da92668c4b5fff9", 0x3e}, 0x60) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240), 0x4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000340)={0x9, 0xe0, [], {0x0, @reserved}}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000440)={0x6, &(0x7f0000000400)=[{}, {}, {}, {0x0}, {}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000480)={r6, 0x3}) r7 = getegid() r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x3, 0x995, 0xffff, 0xbf7c, 0x1, r0, 0x3}, 0x2c) r9 = syz_open_dev$sndmidi(&(0x7f0000000500)='/dev/snd/midiC#D#\x00', 0x1000, 0x200) ioctl$FS_IOC_GETFSLABEL(r8, 0x81009431, &(0x7f0000000540)) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x402000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) connect$can_bcm(r10, &(0x7f00000007c0)={0x1d, r11}, 0x10) setrlimit(0x8, &(0x7f0000000800)={0x500000000000000, 0x7}) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000840)=0xfffffffffffffffa, 0x4) setgid(r3) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000880)={0x1, 0x7, 0x2, 0x800, r0}) r13 = semget(0x1, 0x4, 0x220) semctl$IPC_SET(r13, 0x0, 0x1, &(0x7f00000008c0)={{0xce, r12, r7, r2, r3, 0x1, 0x1}, 0x3, 0x2c7, 0x196}) ioctl$LOOP_SET_STATUS(r10, 0x4c02, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x8, 0xb, 0x14, 0x11, "1ced5c3730ad81867e5b79707aaef623e86e8dba234c5a9b7bb9cec2b274ca23fe4646181bdc66feef688ba7a6f3f4b1721ff6780b1fb8f5b7046f6e2bf4eb58", "ae3cfd7a12cbc13fbb370918e0a6011d28b3356a9f1578be4130ff58e414c4da", [0x0, 0x80000000000000]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000a00)={r5, 0x1}) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000a40)={0x0, 0x7, 0xb832, 0x1, 0x1f, 0x401}) setxattr$trusted_overlay_nlink(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='trusted.overlay.nlink\x00', &(0x7f0000000b00)={'U-', 0x4}, 0x28, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r9, 0x29, 0x2a, &(0x7f0000000b40)={0x100, {{0xa, 0x4e21, 0x5, @ipv4={[], [], @multicast2}, 0x7fffffff}}}, 0x88) getsockopt$inet6_buf(r4, 0x29, 0x3f, &(0x7f0000000c00)=""/134, &(0x7f0000000cc0)=0x86) [ 233.434093] IPVS: ftp: loaded support on port[0] = 21 03:12:27 executing program 2: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00') r0 = geteuid() lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x81, 0x7fff}, {0x7, 0x1}], r0}, 0x18, 0x2) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getgroups(0x4, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee01, 0xee01, 0x0]) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={r3, r0, r4}, 0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in=@remote, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000340)=0xe8) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0x4000, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8810}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=@deltaction={0x144, 0x31, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x8, 0xe14}, [@TCA_ACT_TAB={0x8c, 0x1, [{0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x977a}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x12, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}, {0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0xb, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x34, 0x1, [{0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0xfff}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x1f, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff80000001}}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000000) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000600)=0x9) write$P9_RLERROR(r5, &(0x7f0000000640)={0xe, 0x7, 0x1, {0x5, 'wlan0'}}, 0xe) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000680)) ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f00000006c0)=r5) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000700)={0x0, 0x6}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000780)=@sack_info={r6, 0x1ff, 0x101}, &(0x7f00000007c0)=0xc) clock_gettime(0x0, &(0x7f0000000800)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f0000000840)={0x9, 0x7, 0x4, 0x4000, {r7, r8/1000+10000}, {0x2, 0xc, 0x1, 0x9e, 0x9, 0x5346, "edf8a23b"}, 0x400, 0x1, @offset=0x4, 0x4}) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ppp\x00', 0x400000, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000900)=r5, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f0000000940)={r6, @in={{0x2, 0x4e24, @broadcast}}, 0x401, 0xe8e6, 0x8, 0x200, 0x3}, &(0x7f0000000a00)=0x98) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000a40)=0x9) ioctl$VIDIOC_SUBDEV_S_EDID(r9, 0xc0285629, &(0x7f0000000ac0)={0x2, 0x2, 0x8, [], &(0x7f0000000a80)=0x61}) sync_file_range(r2, 0x800, 0x2, 0x0) ioctl$SG_GET_NUM_WAITING(r5, 0x227d, &(0x7f0000000b00)) r10 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r10, 0x8980, &(0x7f0000000b40)={'ifb0\x00', 0x7}) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000b80)=0x7f, 0x4) ioctl$LOOP_SET_DIRECT_IO(r9, 0x4c08, 0x4) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000bc0)={'nat\x00'}, &(0x7f0000000c40)=0x54) [ 233.679091] IPVS: ftp: loaded support on port[0] = 21 03:12:27 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x400) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000040)={0x2, [0x0, 0x0]}) sendmsg$unix(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000000100)="3ee2f86fe0b2c4276a10faedc84146ac1490453af50bce644c58b682add946c46b474839901a2cdec3dda1e5ace5cbab668780a8965836fafb193c936510c1810910f3f6544a2b97af0720819398b0e591dab3d4646fffd33d50e402612ca616872a0fd25b2b18e48ae0c97d10202dc3be8ee2987a0f66b918f5f439cd2b03a5c6a5ae7be66a8d45b6ec45cb23fb2b88760d2739bc6d8283b11f6f42e998060e7dcbbdf15b23c3e8b1a83b6d787d39d3dbf1912a441ad3790d4b37fb2d81829e6e909b2e2caaed3476e0f5a3724aa63ffcd9eada30de48a3257f9f4fd086192c0b2b94f0acfabcf313fd2f9487b75cb755d2583bc357318c0c69de0f3f7a1597b0fbba3c41dd692908ac79c1db938022969b9c248d18850157cb747108fe111842a107ba6be59a20b8a91d3ad295b55900fb04dcb0a623cd9bd20bc72ac04a9c9322cbef985f5bfbd5b8ea0bea3b69831070a08ae3ceb28aed8d29b21ef500d1d311bf0e83177ab6eebc972a5e4a6ce51f94d61132dae2f4ebb373bd526d68c49da88a61240dc0a7838aa5db24eb042b571a7ddfec6d65119b9ec0503c081e8bd07a50ee5a4db2086ca69f42a8ae4236e54b342638605898240e68304247c98a7cf7d76113ff016a1a5d734b327e50d1d61e2e9d8ed342053808e1b5b5f3bf90be74fcf42753db06b90b86bf4ce7796b3689f6ddc6a273032263f389aee1051a7771642f685bd3339dff27209c953f70dabd65a1a4e34da15c62ab2e0f280a46bac72d6fdd0e4269f85b3be6b6a4e2f7efbf845e716313b55e206153936b0222a85876d5bb78179048578d48b2f9a1ae00ac47d04cb12c5389de0cd26da018a76609e0803ca7f51d9be87bf1f365a11462184cb519527cc70ea43f4404a50ed82d68cd662b5fb8a6d28d991fa21d18ce4b1e5120ba5a08bbc1c01e0bebe56d0d3c4b10d12a17041419bb1f54e8ededaf65844fb45d5a20f05850a8006e4ec4c961f41d8f515144e379ed8b7950700b88195e90517179b8195f0f96417736241776859914071c19f8f17dd305b0e07b359de5adb961aad78c26294d705753f5f636f37b5200898a25ac5dd06b06e8b5e10c089ca9493cd4e07fd5fa54a21e34ad0075ec914c9117c38251051e79b6680620a5a15d4e25b168e997aa0b6ccfd1ee2284b031592e5627b28eb4e90af02357f40094392cec0424f92767ccc2c79151aabbe988aeb5db34ff02a0e765edc3ae43022e6d98c2a94de80f5a83f0047de3b569d3b79ab37334702cde12dab9ff0fd332447e0d4f2c5478dd54c4dfedb9acf0160de9801656dd73abcb094654697e7ddcd5f4a0dda1f2a2426d3e4ae8bfc0c12492d2ccd8110eadf07a074ada34e45e3706506934453096ecaadde7b934a930a4c0b45f31213ca405eabb2c7b627c31f46586816c2eb496b2ce100ece6b4bb0eed4080614b24332c56bf61f9a89da416a1ab4b35822ae33158e13b3d07231d9e36aafa94ba6ef3ef3202dd3f3f00bcc2f127a648f964fcc6307ba113846267b1c99c9b1292c6b737056f7f2e53a0777196176d4cc31788aa61762cb100a9ac95930fd950020a2242048036102386b0f0f5d8d6cfb573897ab31af1070347d7670720b7cdb2ca1a823f61027d2fb6da33ac8451bad69d155d280727ddcdca7684907fff624df75ab062606bd819cba5838e75a9bac69dfbc807d38aa5efcd0875d5c129c96fa3ddb1d3460a3ebfc22d90edaab25489f1fb2ed357ead59b3614c2b9e31af21da17bd2f0b4dfb00877fc781c47a0f67ece2fcc310d5a199889ec742c58f9d8681476fb607b6fefb7ed1d0ffa2326226050b93dbc6da45e463eacf5ff96b05f73b9b9cbf8edf83be588c8f6935db28626506fed5349764f80a679066441a967d8788cd9f68b79b8d6ee30c29d5fb7389b65294c1e1ae4ae7dc70faf26b62005ef2ded65b111e4a80f117a265027a396ae19f771e75ea2196af38e1fba0a91f83bfd98a9cc9aa657877542217cec0312d431539532f62e0f8c01ef2536c227371d51c6009bc8b62a134d0a8fc8334ecfa49d89c12d2e9ce4ed2467541c1961076e169e25c67e3266d0d40d2b5caf5d446e3e34d35a1256421ceb28cacc6745f987d104c91ff0f38ac69869491a9ab80dc7553f511f4eb3ab5ac7896d56b45906544608dc8cc572a0b17057a9d37656c3f79238addf4519fbdbc3ff662d26e0b7335b2fb0ee311b579c8c122d5af62a04a28d288479d7598b76789304f1d940c499e0a0be9906012c6743c5bf6ecc586c4321e3b9bb0768606d81fd1e131dc1025cce91800b70048d4c21edb14a71fba230d25f3646fc4eebdb1cbfa0d14abc5e05a1f93974c48dd12a17b67f3750439b5d38b3d9157dae3ab9ff271bce180ea5d99b7858f4b21471b00383753ca40efa5ea60c2776c879b6d3bfd2ad8f918340c9d6df9e51634eb07bae255d2cf2d9268af7814130c78545bea83b145c147d000e78c064346c9f7608f72ed55f2e122c86ad2e3cc047dec1453d1cf9b90a0d0605121591c18b16dd67004b07e2f06f1f94501e00b0177b627db9f63d7afd3fc667c5441be3e983c9ce0964dd00ef8b7aa93e79f308c906a68db15edc0075f847b62e5029494987520372f0bf5ca2dfbf82b9bcd1cbf31fa9b653b7f2185894c070ba1d44352ae7204d7a81f74139302153060c5dedafce4abbf917dd480ac17f6bfa9e48244f283474a41342fe83c0e2be759f4c72fb040e87932e1ab0e0c82c03ea12ba648f367528fab1b47b85409a0b02e78663d9609248bfb2ba3b5cb9fe184c0bcd395b7078d84de622d52338315ac148c6ecf38ca9b3f9bddf57ceeb151423915ddbe72f1cbb00d9b7f05f274141620e036a527c2b87f81c55a776552f7e4cadc9f57661e20e5fbce53cf7d9b1939ee342c06e7003f1de64672143f7cd262275e48ef28e4c367ad552ecc8419df4aca8ae3e4a3b90b4e6c4313446d9134bbdf799f3fc53dd4ee6fa6976b873bface58f6f67fcf4e2298ce04763a5a934059b9639a74ea3c12a0e0d8b686f1c8c52b957fc994f16c2f43cd0bf1e31f0738c82c6ea9ef8f76ad6de1672d3721f73fc947f081f7dcaaebd07b9052c3f485ac35f24285284177b525d428ce7194d1b4df7a3ddc1dcef94072618c4c23c979d68ac82e3067866bcb426710d2c270eeac0777252b988475b9587feb76d91814dd353facd9b7ad4a6b17a78f53fab5a384dd7fcb6db7a21d90bd21ca7c00ef500ecc9bb02b57ed42c2f1b6d4909b670b3d58a7424827f3d4591d10d3c86c0389388732d34b60f2eeba2272b8159fa7a82c4a773b6ac04383cf4618f316759d85016c510dd0acdb03487d3cc135f46636fb069fac7d1c2cda90a6be0a37373be78c1c28750ea8eca6bf27494d337c2c54d84139c564112a1118b104b7888a835845196c54bd61d18d4cc6919e19ea9ac99a20685cfb395af751c25aa26e8dbc9c5a24cbdb851a6dfce21adb715b7fbfedb147030f01b722dcdcf1a4f5ad57be9cdc56b3bd8f8a90d3d1e991d6a0e026deaa364fa7082c4b312a5dbf3b917ed967ad56ebf9691d1ccbc0fa8caed4b3e743fb362a07db8af895c39df9539d5f7d76e226082514601ff5ad3cd96982d00a90013c4402edc26112cebe1c5a8a5c3a488ffd147ad7002e805838803d26fcef18364c14a1a2832a8d2e56ff68350350f8ea666054f9dcb10f33dde198f809eab29b224c87b3f76e9483c94397399b475e1bc6e23e04e43b4cc08c7511d9b4d255207b51547bf6a92cc3a56dbb6173f9feb7ffa081b48cf6ed79c60632840da462a30fa34f38601bdddcb909a5e2877bce857a99079cc1762fe5c168f20df6c8b76bb21ac25b54699095b11f51abb513ff466bab9e83ebf4347dbcca5a7c9f2083c772d57c5180f7bf179ff483b9bfe75fa7d6a4f89798a3f89f0cc4ed73b2751830f5476df146c8079c3b8bdf72c9389379ee79af2f1d01adba98c5c7c5313031555c63e542e3595f670fc8268d4c4ae01aca6a7569732d2c5435ceef1dfb4be74f07233f135c75e8d9d824f7163e10cd4d76f9ed594fce96a5d6e55263eba7d5d66931cd0c9cfa41cd55a75e99e85af87e37d278dea13a3186399ed432a0a684b6c2082b65f8b9956ad0603d7ddd3e0add534e9cb46de4634e365d835b081b25492e3a0a42f810c53492b91da72292a5cff41d74fc1464635a197a3e9a49be76d524271724c89b07d5a4cc9f2949de55d39328296a48fb28b7dffe53ced70aeb41803010b0aefd0ce6817452e5fff8659d34c793de230e4485a83d0e6d5489827f0f32a032f190f5bafaae327a2f4ed03cfcd0cc885f43aa2277ace65f32b6eadb7dfd7b6652fade9f5e8d731f84cd0d870919f26fd2b62b48f8e56907b42af417697173a2b5a5588a14705f6df663f93e3b008d5d2f2736e26687f8aafd810c04777dd47751e592349e2a82b2e0618afbdf8f452d2b91a87ea6be2a2ea3785b34c339c03a3fb308efa29429306de83682ca3de02b947911cdea0d863a6df67457f1f5f120dffb12ba4e9f9387ab01058ba98234e7f30743a2162bb12791d42dc81b7bd16c6ba9e72d9eb0b3d9e1a8d93db7632bfc5f155c934ab6a553fb9fffd025e7a31f1375bfcd259a5fc6c7d6c1eae102e49da69b77d2ecb4f85f89629b754184fff3f900eafd8f4d1f95e8230ffc1917cf61a92076b623ecbc2843e6ba8257be2b21f1efd85b41c9589c7232fd55861b81675b87789b69b90a123f0895805d866b736792cdca3d7b9f29ef13d2cbbc62090c45ad45644e01e411e30f93ee85a8f2d42537c4716d45fac1e291fbfa7d27adf179ff9f2afa66efb4e312b7e65ec4d129878bf8b747cd4c76798493269e38a234686c073dbe92b1257b55383da60a503ca17c52eaf1e224c44a3a43ea50de4e41ee76a0e89fa1027e2e80d86fbd768fd0e235d4984a74c49a818952659a945a72a69d2f21cc72e35380665f9c46e2c924b5f47f2cf388348391067c521fc19c110377c3f52ba8f568e2ec1ff025ec44ddad6cd00a8b0a5b1af22f318f92b68014585d5b0378cde869545ff83423303c97fdb0f61a82c215060698ba4dab8129741c1aa7b85a949730a65d747e8597cc2f64676dfa0fbb9e090ba4a6c947f1648e81ab1876074be8f3b27192e1fe5c94fa9c3a683f13817c1360b34c90be51315217d0593b1e54a42c78cd6c78f8f88effec589efeb86d857482f199c0005134a4dfb2d4f09cb0d400a16e9bfd9812da57dac0f61cae1d00a8887594743e33678064d75fb871e98c2146563ebb6824569f2680aa3f122254e3dfb97bb7fe03a4ba628bb37b5774a36813ddbe159e5acf9a26ae8dd2b5f6a3513cb6e82ada270e5d9dc7c26a3a7ac2a179065e6d4710e27c0d16311295be2fa16ae878c9735ad438e5f00fe6353d31edef20f74d0b6422ecbd3f8af9b32ba7c9122e9cb0974f2d9bac594440d0281611a60569df354ea03ce9dbe8cc52b95b5e06684856806a3472cbdc3a5aae081b286ca61ae74d46e45d8f6ca9a8c427e1d017c26dabf9cdbd3d1b12f18b2bcfaabffa1b36a44eea732242f02c9b0576f0175e7522f393795fe98764f307b7c280c47c1771f7476cc49b37ad7c116b3cd9c3147339575fa11e20051f25451d922fe3b81c63191d30078cb72849cdfd6bab6fb34151bce31516cf9fc5aba4a502d637f5969fda7bd02c2b455a42fa48a3ea1ceca6035d4e418e37072eec4b64671b1fa775f38f342b63afdaefb1b34c5f", 0x1000}, {&(0x7f0000001100)="bdf1ae4c9551d1f2adffd1b3983d5e2142573540022bb76eb989595bfad8b277418591e165d7c989ec61576c977f273071cae3926173e2902c8638c804aba818225888a1d260a4b4add1137548223d4b26586e42c548e1df9ce6c5640a230d589d36ad9dce5a3dbaea6f2176ac90353010f691dc3565baee122c734e41d6b157b568e125775e8f3de9a886309da79775d2f4a88a5fa9c450f55e03c356cb8b6922e0b8e8abfb46475023835d54308c34a65537b3f49cba5b6e5e38c69aa6909704ac226b4e831f5c11646721a297233c20b949b5711503273dc46312", 0xdc}, {&(0x7f0000001200)="288f57a02baf750bde194bdfab1da48b8a87a39b6f299968f8fd4a9a696410a4943be932c39babc88739a7229dd88185641b7859d3a23577519ced12f3077b1d179df95638e4bc8d422135e0cdfe62eb90355723ecb0fffd", 0x58}, {&(0x7f0000001280)="174d0fe8bbde199ba50aa1bf10a95296c1b28ba625ae7690a098844e6dbbe5bf67d2a4ea8d26c4f0cbc917fd2dd1ee821b0395f8122e4fea4111c0ba177d45e3234d1d76a264cdc08ee009d111133253fc9c64537cb7c0959e30c6b4476b25b5fb408bfcaeffbd287413bfd275a08a4f0d0cdf7f3832830a2efecd098ab2f0f8e7aa3f25474fa2524e047132b8cc4cf98a077059a1accea9fb0dde70c50f89ad6add12baf6995f134dc3145b9c671b457c2593f0f36f99879e0df04aadb95a", 0xbf}, {&(0x7f0000001340)="85e0b8ffc4df033c8d499f881d42682d9948c8c0f7540663ca2863", 0x1b}, {&(0x7f0000001380)="a58e484834c6b5", 0x7}, {&(0x7f00000013c0)="ea72d43dfc419315c93f71b4b7777526641002e8851c7e84b81b4e919392a5657be7062c6461237e682f8f30d2a8d0d06e5199ff5b06e320f19882e29f25dd35ea55401bbbb773ff10030bd07ef930cef4cf6ce75b48dd15db486f53b3e1cca6e8894304de9c50bacc45a6142eb0", 0x6e}], 0x7, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$inet_sctp(r0, &(0x7f00000019c0)={&(0x7f0000001500)=@in6={0xa, 0x4e23, 0x100000000000, @dev={0xfe, 0x80, [], 0x1e}, 0x7}, 0x1c, &(0x7f0000001900)=[{&(0x7f0000001540)="d56831a7fc590ac47421126e933b75555745332f84692b20caf9c047ccde21b15615b0ce736c6dadaeb80fdd0785a92fc98d089ead6cd9ab92c61e08d2f11e591650526f4a083692fddcde890b4b12155f54fb92f7d948a50de6550902d32ae0cd6d1abf54e6ea857456372848266b845480fe8ccd83ed9a11015f54be8c2268000b58a2249c70ee1c3365c89b2844a6d6352f02cffee4df0477fecb888e0dc3ca19046b6c7b36d8d3a77ea3bca176fc9d5bf8f87f6b61a7dd08cdaa7b7b2d1ba9cad432158a82128e1c3b16dc77c7d9a5abd7ce7ca6e6", 0xd7}, {&(0x7f0000001640)="f5ea5fa28823bfb0d3baf4ae6495b4d55b1da7a76dbae230afe1bbbefe264eb4a40bcf2ef0f00cc423f583388872a094a2544a0f411b26c0a94268b771880a58455f8c0aded92218d41439557b3f531df65cac1f5ad872ebb3e19528b4d9d364b34f690433a8edf1011b5d80e27a36e1d32be7512950dd207e503d5493e883f6c489c8319361b7b2a3ff03299114f107715d795c74d6ae7668279dc5abfa0e22c0153a021c04e468cec1a1282055b5567e85e7ae7f920288aa65926f49294947eb814d", 0xc3}, {&(0x7f0000001740)="6ab5386c90199e6cfd47df2b64d056cdbb1f20673694df28a9da4d0cec04d53db175b767e3f23f9fa31f9be274baece1d2213ffb97258d6a97aa9bbfcef7c6596d3851", 0x43}, {&(0x7f00000017c0)="ad1265bbe774538e32b9f56880a428454864f1bbb87b0e3f2a4f5a070de5cb10fe19e10628a41bd33ac16e06f5f1ea52a46fcde872b830937f95ce088c4f2af2fb7666a7a8ff2bd1b0f208d26bc36925b7b9d9be39f7a4b88bfae8bb2224710091a9170c", 0x64}, {&(0x7f0000001840)="334c0700195d3c77fe32f4018796eb5ad429ffb80fc87baa4819070a956557c43e86eba7ebe127692f4a5b0eb14f3d3b9b0dcbeb5f45db930b735ab21effc89ae432e592ec077c2e7bd4b21bd45f5076060896e254f7f56ec901470627d0f6cd5f913f9865483045d8beab535251e2ff8fb0243bd5de744d2019547ee103953258892abeb00185ebd08c51a103735a6f9623edec2bc364970814a99efd7236e7139d9c8e9c3a203b2d43b28964876f026052", 0xb2}], 0x5, &(0x7f0000001980)=[@init={0x18, 0x84, 0x0, {0x7fff, 0x9e, 0x2}}], 0x18, 0x4c840}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000001a00)=0x478) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000001a40)={0x3, 0x1ff, 0x1}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000001a80)=0x2, 0x4) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000001ac0)={0xcda, 0x7, 0x5, 0x7fffffff, 0x0, 0xffffffffffffff2f}) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000001b00)=0xfffffffffffff001, 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000001b40)) mount$9p_unix(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)='9p\x00', 0x220048, &(0x7f0000001c40)={'trans=unix,', {[{@fscache='fscache'}, {@posixacl='posixacl'}, {@cache_mmap='cache=mmap'}, {@cache_fscache='cache=fscache'}], [{@subj_type={'subj_type'}}, {@subj_role={'subj_role', 0x3d, '/dev/snd/pcmC#D#c\x00'}}]}}) r1 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001cc0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000001dc0)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000001e00)={0x0, 0x9, r1, 0xff, r2, 0xffff, 0x81, 0x4}) r3 = getegid() getgroups(0x7, &(0x7f0000001ec0)=[0xffffffffffffffff, 0xee00, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0x0]) lsetxattr$system_posix_acl(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)='system.posix_acl_default\x00', &(0x7f0000001f00)={{}, {0x1, 0x2}, [{0x2, 0x2, r2}, {0x2, 0x7, r2}, {0x2, 0x6, r2}, {0x2, 0x7, r2}, {0x2, 0x0, r2}, {0x2, 0x2, r2}], {0x4, 0x1}, [{0x8, 0x5, r3}, {0x8, 0x5, r4}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x0) getdents(r0, &(0x7f0000001f80)=""/53, 0x35) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000001fc0)) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000002040)=""/174) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000002100), &(0x7f0000002140)=0xc) sendmsg$unix(r0, &(0x7f0000002380)={&(0x7f0000002180)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000022c0)=[{&(0x7f0000002200)="160770ff6112850b796d8c0020d5283885c1804b1f4507ef6d9af84fa3f784ed934b4b8f7af07d69e3fa67ae2b9a5306a9faeeaea3031d809e3ee7a5b30ce16f5f", 0x41}, {&(0x7f0000002280)}], 0x2, &(0x7f0000002300)=[@cred={0x20, 0x1, 0x2, r1, r2, r5}, @rights={0x38, 0x1, 0x1, [r0, r6, r0, r0, r0, r6, r6, r6, r0]}, @rights={0x18, 0x1, 0x1, [r6]}], 0x70, 0x44000}, 0x4000) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000023c0)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000002400)=[{0x4, 0x1}, {0x6, 0x7fff}, {0x8, 0x6a68}, {0xc, 0xd1b}, {0xa, 0x200}], 0x5) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, &(0x7f0000002440)=""/255, &(0x7f0000002540)=0xff) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000002580)=0xfffffffffffffffd) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000025c0)={0x0, 0x5, 0x0, 0x401}) lchown(&(0x7f0000002600)='./file0\x00', r2, r5) [ 234.254199] IPVS: ftp: loaded support on port[0] = 21 03:12:28 executing program 4: fstat(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000000)='system!ppp1+\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x200000, &(0x7f0000000140)={'trans=virtio,', {[{@loose='loose'}], [{@smackfsdef={'smackfsdef'}}, {@fowner_gt={'fowner>', r0}}]}}) syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x5, &(0x7f0000002380)=[{&(0x7f0000000200)="1660c06571300a6ca9a2123634e614fc457813fd9d91bf8acd4aa4", 0x1b, 0x5}, {&(0x7f0000000240)="e6844844f289b8c4d5f47b05e7b68f6f7a50779554ae102315ad4d8ec8a53b9c9ac5459127fa14ae5b01e2bd517e2df15453ff56a75cf965efe063dcea7ebe2ff861344546d0c9d473cea5a357c886400e64119024fe9c2f0d8b063e97c1b65238261436e111df23fb012805c6a31bdf16969cd464827a82efe1c1ccd134388cec6d5f", 0x83, 0x2}, {&(0x7f0000000300)="04c7f07375dc346375bd459be966d688586ef3c9f329f54af67ac555ae75b0c51b9ab6db8e05607de274b8e635f1abcb6f3a9fd87340adc9a4716e4acf1f0eb588bea0b2b65826a560cdfd4a54381ddbabaeb8d08e37dc765c746ad11561698b1d4683ca41ca2ad773626d6c89592ba432cfbabf9ec2a1c3ea11e814c4b9ae88859bed556377a7a65a5dc0fa743f61ab5742664f12e1de3f64f310321463187a83b8d956b796a04def722811b2143d73f145ae7130bb3311c353f1f967187db6b299ac7e4088ad7c81e07a309ae705a3fed8ec815896286e538ab95b5592aabfb81d1d9a7eaf75e0a9f1c7fee91f6de703898c0f5f728ac4dc85e105438e0f5bd479a3d5575da5d9ab14a81648a207b1610d84e812480b9421262955b3ba7a271024b0088eea39c4792232388595b05d29325614827e89c535774bac83379c1130bdea208968723fd1f8ca7feffb518187cce69d3421c5ea7d60571dcfce19d5561d40c56fe67c944bf46a86a7d8b5e1ea77326a152f29332548d0d5466ccc1b3f0ca0b50cf1f228bf90d409dacacad938476ad87fb86567e58c2c295a8638d0a9240def11c50340a2af98fbdb74b0ef4aded4f0b778fb127dfaded2b3c44a72590642f3ea43b9d1a282ddbe440ca3692265020e02260cf5c1746a32f470dc80a9e68f7bf1d2e7a003a838c97f6a3ff74d80c259371975ba72d0ecdbad44204fa45508ba01b4c6891b84e1da6b336e7238bef861054fbfd91ef2e472eabb70ac54b8d60b2921ac1c254525c684c1458166a7e5665ac6104dfa5a33115b8097d963f0d571f39915269999f9c52e73185ede01f223ad76d5d28786fccd84e5be5648773f5c7a69843ba8c3fb4183a556724349e634ee6531730e114a18fc579ed07ba053c07075ad0ca7dd2f05c6f2373c56dfe514f6babb97992ddba429e87f5297d9fa2031a65ec634e2d781627862e37f61f49c27ee3b60b40c81ad5c44ffce36cda816bbe14f6f74eb66682bde687c4114c6e0b68b07a4e28b97a178f294290510bb6585a9cd6652816fdf72561c34c30f36a15dcf124c9414da4d2d98e5c3b027d77af0d766652d9ae19eefebb8129552c6387634c58add0d7e49f3e9e9210be43d38e9b2cc41ba98227f5aef5f6f85403a2ea1528fffa7dea17a592f80fe9f83426415d0a7ba3fc1591d31c9689a62ef0034e47e5ef1ab7a9f3d533eceecd881d74981524f80e6309c446f8c962064cd6052a485fea661d219affbfecd6696f352741f2729aa96404acfaeadb5c803d2b5d53ffa3be283f389b33d630467f940006f7c68f98c9063adca9f7b6a071f7e762e42f691dc268b00a64f7c4db800c0276482a48287541f9328861225ea466837bd45e51474b845c0add4f8f9a889e2cad2d1a9b3c635b695716c42cbcd7070e83b1eeb10b2f37faac966aa27c558d0ff47666010b4fb2c0fb6c1de882fa185188ef2ece9e45f0c6c94633a5e1219d746b07c2f05680cbaccc25596530c860df33f5ff6a88db525cb17f03670085514bc2b0189f292a8e0a820e59827cd7e62dd797e8a8b198b2c9d076252190cef6baa01e9aa087a768c550b71c2b006abd0e2dc99412c6e72cba286ffe039ebd83ad8897350a123eb87989d704180330e7c5aad3b2f752305c952a550458618b8d943a96e5420d47c7db9b82655c1e269eb64ade5523b81138c3031af5ed1b37e5fdaf098c631399f22cd844ca5ee9102e7f416c9b41791989f378f8024e2a18b9929a833f3f1bc52e74b87a00c344f876ef7c08c8c404cf3105abe5aec9563a66a9019e17cb14594ca000c42c88da6274d6c2736a2c1c5c17cda6cfac1acbefc499bd36f415c5ed0c6749872cbb79f26dfb7fc3b83d4e8f4a45c45b5eabf581c417378e82c5dfb0e24043d6d0c6b33188bb61afb14d587a7832ed6b9ca5cd8f556dccd51e4efb8b46ccb8df21b65ae5fb6a42036ae34e587f4d549f55be3bcebe809cc8f6582e607954bfc765f4fbe2c13697adb025049028c02f1cdf13f1fb750e06f7ee3eab5e55fe7846fb8e0e908b80e2727cc46cc4f1cbb0df7f5429a644035e50035d322b1afd1a0bd467e3680dfb17e75966c930cb8d2c9821a0c8485555b133ef35fadd2e26ee63d35ece573406f68a26ed574b0dc9a88eaa5742d9088de74298619d1afa0dbfa39c4f3b4e11c99d3107358d8d1957150888f808e664eb2efcbb82916e454a5607e20abf3273407e1b884b614a3917449906c744082f1b289a5ef4a099e8915c88781b730c9057d9164f9de517ab9ee6ae894d2c30418d31c7b0bc8d0b4b639efb441f9fd5d0de4ceb93ac84fc421012ec7502d7e86a56720503c17419f54b72bdf48676acade2768c237f3380cd2ac3b33e768a5d3e93f6b03ce95f82aabade78af4bfbe8194ca5efa0afc75e1826649d688c5cf54b2b9f7d23046bc58a5272ccfa7fbed6b471dcf262ca346ed5336d181f6315770596924ce17ba581ba456420a024d1b00df039743b31664772488bf2bc34ea5beb7e9debcc24352f26995c0ddac87dd19f436c4c664082c5ee0d18b590b777213bc0d319942adf7fb9e19bef6772183755b657ba4e24ac2b51ce4258561c2368d50dc3ad5a94008fbee181456c5bcfcaf7ab13f16e63b3d1af9486fb41ce45d9a5a1e5e0e163e731c7bc63133763afa11713f09bf3cd0894d8e2334b16100f646f9e054101598991539ba74fa7ef0545e3da2a3a424240ce5fc996c169fa184ac3e5710942033015d101019489e1a803089033a7fd8553c7b588166b2e6ccb4145d621b43eac3b1e2ad0f59643b372586f8d3f0a60715ceb02eee1c87b364e6d67413ac34a913abdb3850ad30d0b55d6bd9d345261f61bce41d9623334922056be14e817a2e69fcc45ea9f7780bac565dcddf11aa038e926ead768cb52046ec1e4fda36f99a87b9dc2f818fd1d841f851c43a83c806d6b9b0cd679bd803fba6d8d16fa36f038f1ca52402215b72463577fcb97ea9ab1ef0e4957602b9caf24c848deedbc52fb8eadef5f48133a8d1c67a342d2fd167ef0f088dcc4fc1b404a149c3610ac2e953b5def3efa1545c54272b4edb98d8c72a3c2a89834ae16ebf734510c64892ee2dc396fac421edcecf6a8a29cfbb0a7371adbb4c7bf9ae1a621f9904a67f4648a909f3b44735a8ace42ac1f82c1b550c3987d3e4dbd7aa92babdcbed18232cbd48b523675ace65ef1d2ec5feddd6e427e11f7d8874839498758946aa45d713bc178b6792052118f307a3993540498c77a34b7e2ba87f803edb010917c4b141f1bfe73795d94633b10eb1333b1e00629de0740d12000286022fb252bbe9099b835ff15e0610719e261efc85db68b357856807412ee32de5a91705ed61da7541ecfd105a795654ae41a70c41bb52b540cd5c16cbb0804d8dab1ae5828865c6727f5eeaae224cc2c6e2377afdae3f05ed0cab08d1c21975021693e1780788b04219cf252a429dd9109d6b6eedf74fdc2ecd2b48bdde6a793ed12b6ac4a887ded149e68d29817daf6fe8147490d80d65bb17d2f79817e8f996a8a22b24a24d3d31eea54fc18d58d6569ae618fa6d90bd4750ca2eb1bdd4716e0773c96c1c0f72f617293e308ea2bc22af18a6124ae5c4af69f893e3e8f9b807e5a71b01fc5183334f2885f88e840dbbb76361f9dc076ab857c0701626b260f99898e42647e852aa7648bcad5ec030d23b609b8c25000f28fc40440ff42a44bac02b89ddd45de2e1c0822c65eb255c3991ff75d3cc728579cf7f6bbdd0060c75f52dc55b1bf14b4fc78739454c3f5125cea36caabd0b2ecd48380fb815be24c5c188104b6c51ae087d29512cd3e474e7494c0bde3186325b6009b4baa14457a302e9f0fcdcd2150ce6b8093db1609d211098a69ef1d85945c059ef1af5d03e63748a5d38f1e3cf4e0ecdb0ea87b83d56ebd0ce79ff3b25045b2bcfd844d83945150e2b28c1b522ab7514602976dec13f3d72fdf23cd719e568c5e48aab8750d685ceb2aab9c92c0d5973ec472b1ea164ec1069142e17a7906dd6fb69d4662e9f75742e4f12003328010ce4d871f5175016c65de3031dcd7a8b95c64421e254c848c4a745d1fd14cb4088a8d615154337c264c5bf1e1de959840c00570e6aa69a1593098c977eb47738b7b700971639bd83a76001791c54e92f3c954c464ec5545580f52793c7a7b22c3a9616c9875c4be3be0decb41fa83470846b801001c91dff4f3a6cb8a7c71e5870632e10f6f3994a0f2aab4e9112e269fd83b9bdffed483cf51a2e04b84ad9a4ab071167b896209bee870c78f7d0dcfa179e7303fcbb54e9cc48d602b07d3ed4815611761ee8d6b083fc23789ee4f0d7bdd13e93f01d936aa836a67a1aa963ccf5ef66075bf639ebf95e8ab81f8544df500c033024b4490717340c616b499535bc9889c2aabcc9868e6f9cdfcf4884f22fbea1ace2631ec4e03379f27514e5a4cac555e6de0403e1efd7f12b95ac7dc4d36c90cfcd1d29dfde65c110a25138820a048fdc1b255dfe768ce69301370b37a8cdddb3f710d15568cda8eaccc6ca32eceaf30c762101b5f00c1b27a2f0a3f270498b400e421d766d9ce249960069b69dea56a66c3a5b1d742206df3e20979ec42e34341d6be9c6106b469c9ae0da6aa242cff90f25bceca89fd83a33869311b3641dcf8b7d58a8ac39f45d27ff4d064c43715877e405a1f5ab7a5c340bde48883bf756cec1ebc0a080d8f58dabcba8e0fb839f31122d2b1146287fd4606abcbc10e43746be6bc34931506d876d9411903a93bc6e7a9f1ad5903347876fa5c10494dd61fcefd1d8b2b63052027bbe98535935806e21a190c2d270510c5b7caa885571dc36b589d1939a91ba57a205f1b11b98af7031093948f293d9b832be0f7e74d8f50bbb9bd22dc69fe6c72a38171c813ed3ca482698b34bd1c5b7475260f8300cd5603f6ac55c36de183b6e302c9a475ea1844604813c2dbaff33f08576b7f5f8c14c0750ee2601ba8593b5584e55c5c54b6edaef902712e463f1830f16ffee891ebe647b3de2cf329fe1e5b3cda8c92ea42cd66117b698ee13065b70d172cc53732194e455db6164212453644fabb64cee4a670cfaeb4bcf69087015c82c9ab8828c794e22463f4ae1caad0416c4ce779ccd665a594b55a9483e6468abaf033d9078c2646c62ac92e4c5c5442617160bfb49d39f55d4d52fcf36f2527b6a91ec259d018b49c7684c8bfb6f287199ef5dccd370a083301e52b0409b8255fdb44cbd63ba39216d5454ff224e687aa8073683b2d5422941c9a66f2e4b1c68d6bd2d2036e90c07cc2d3e47da9ceb1d254d17ead96421599d4e6174c5b93304992b162cbfad25e2e7fd3e5d506c738f7a47d214e7a905c77b0c95bcbc9fed011b3378bd5b4030585dcffcb129bcb6fb01f2fb0040c0196b4afef7d59085d72417340a3ce64a4dcfb399e2841470120ebcc872c0ae7db25878e241a242bcf1297de0eb695a332d1d6532e86949e3dab70bfc94c8a84866f6c11f7a7d685dbfb77ae19e021a260f06933fb2d0478b6ab5ee215bb5757e645a17dd09c7f0a40dcc620f6dd9bc359340d6accbbc7a029b3377ed311d38ca2d9d90f0e821eb652be4827e26a38b3e33e9b4818cd91ed4ad12909171ba3803d40fb1a19cdb6fc80f6d0f8569327283adf4e0721ba9eaece36fc10b3e9b41d87aced93c7e4aa257477472972a4e9f6335b5f42e09b917cbaae41f31da875ec9e66ed57bd7f68f0f7bf104533dddcf837b328d1a", 0x1000, 0x8a6e2cd}, {&(0x7f0000001300)="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", 0x1000, 0x1ff}, {&(0x7f0000002300)="e342b1c8467c435a1907128fe2e5893318a3bcf0fce65c750902cc6128516f15b3cb0bad65d38e12353e9e2fd6a09e6998de376f4621f89645e7b0377e1b48a6763509fe", 0x44, 0x1}], 0x2000408, &(0x7f0000002400)={[{@nls={'nls', 0x3d, 'default'}}, {@errors_recover='errors=recover'}, {@nls={'nls', 0x3d, 'macceltic'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@euid_gt={'euid>', r0}}, {@smackfstransmute={'smackfstransmute', 0x3d, ']([\\wlan1'}}, {@context={'context', 0x3d, 'staff_u'}}, {@audit='audit'}, {@euid_gt={'euid>', r0}}, {@hash='hash'}]}) mount$overlay(0x0, &(0x7f0000002500)='./file0\x00', &(0x7f0000002540)='overlay\x00', 0x41000, &(0x7f0000002580)={[{@metacopy_on='metacopy=on'}, {@metacopy_off='metacopy=off'}, {@nfs_export_off='nfs_export=off'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'nls'}}, {@audit='audit'}, {@uid_gt={'uid>', r0}}, {@uid_lt={'uid<', r0}}, {@dont_measure='dont_measure'}, {@subj_type={'subj_type', 0x3d, "706f7369785f61636c5f616363657373626465766370757365745c5e656d31de"}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'euid>'}}]}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000002640)='/dev/qat_adf_ctl\x00', 0x80800, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) write$P9_RREADDIR(r2, &(0x7f0000002680)={0xc5, 0x29, 0x2, {0x2, [{{0x8, 0x3, 0x2}, 0x400, 0x16b7503, 0x7, './file0'}, {{0x2, 0x4, 0x1}, 0xffffffff, 0xfffffffffffffffb, 0x7, './file0'}, {{0x20, 0x1, 0x5}, 0x1, 0x0, 0x7, './file0'}, {{0x47, 0x3, 0x1}, 0x9, 0x3f, 0x7, './file0'}, {{0x40, 0x3, 0x2}, 0x6, 0x9, 0x7, './file0'}, {{0x40, 0x4, 0x8}, 0x6, 0xffffffff00000001, 0x7, './file0'}]}}, 0xc5) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000002780)=0x8) r3 = msgget(0x0, 0x0) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000027c0)=""/48) ioctl$VT_DISALLOCATE(r2, 0x5608) r4 = add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840)={'syz', 0x2}, &(0x7f0000002880)="9c3a70e828f5b1c70aa9133de2c34bdfc39e48b7625f7faf9fe31e50bc88b5973da4b9cbcdad145b", 0x28, 0xfffffffffffffff9) keyctl$chown(0x4, r4, r0, r1) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f00000028c0)) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000002900)=""/74) r5 = syz_open_dev$sndpcmp(&(0x7f0000002980)='/dev/snd/pcmC#D#p\x00', 0xb8, 0x0) msgget(0x2, 0x400) restart_syscall() setns(r2, 0x20000000) socket$bt_rfcomm(0x1f, 0x0, 0x3) r6 = add_key(&(0x7f0000002a40)='trusted\x00', &(0x7f0000002a80)={'syz', 0x3}, &(0x7f0000002ac0)="0662930e724757c96cd9f22febb6d08ad0be", 0x12, 0x0) keyctl$search(0xa, r4, &(0x7f00000029c0)='.request_key_auth\x00', &(0x7f0000002a00)={'syz', 0x0}, r6) setsockopt$inet6_opts(r5, 0x29, 0x39, &(0x7f0000002b00)=@fragment={0x3f, 0x0, 0x7, 0x1e, 0x0, 0x40, 0x67}, 0x8) times(&(0x7f0000002b40)) syz_mount_image$nfs(&(0x7f0000002b80)='nfs\x00', &(0x7f0000002bc0)='./file0/file0\x00', 0x7, 0x3, &(0x7f0000002dc0)=[{&(0x7f0000002c00)="1e2cda42472b0f2b21d96eba5eff5c1a8997e033290008a98ea7ef0a997c1728a34e0d5c93c945d7c65a6f64168b18ef39e9bcd693e02bc386b474500ff8abf9013a6320fc0248221f1c42aaee8bf0f84af8e5016cc3a22f0958d4669862dd2b168d8e80ac1f848444c54d71b3ce1b4a026f838a346549fb86a2df97d78760ce4396018d00e4ba7f65fa60afdfc9fe", 0x8f}, {&(0x7f0000002cc0)="58173109da8228df4416c71a40e3d5965fd0c1246e2f5456828472f29f6d59828303b271665cc3fc763edbc10dfc2213260f6d56226b34ac48d4afcd911578", 0x3f, 0x4000000000000}, {&(0x7f0000002d00)="632e62ef1b66395aa4e2148de7e28dc0d6eb0330dacb5ac5d98867d54417d068cc82c8ba20b00bca18d57b14b439c4ef5dcada69b1fbd649a7a9ca5b411066ae818b8d9480f1f1b62b33b50c12b80bb0b95849bc5359f360f3d3b6f37f732264ffe9dc4c9af9a47524c0db7f94ad9d5c64dcef9c4a91d4bdc52602150e70200b3c938a3199d7f3f732cacc43c8bd8f8e14a535c0a1cc62706a6447e20e04d4134dcae9e58dd447bd1be1382b5cab64859bbb3e23", 0xb4, 0xcaf5}], 0x804000, &(0x7f0000002e40)='+)ppp0\x00') setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000002e80)={0x1000, 0x0, 0x8000}, 0x4) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000002ec0)) ioctl$VIDIOC_S_AUDOUT(r5, 0x40345632, &(0x7f0000002f00)={0xab8, "36fca2566afb71a21fa10bd3ec5245257d789daaa0ee4421ce49335afa46a54d", 0x0, 0x1}) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000002f40)=0x1f) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000002f80)={0x0, 0x400, 0xa0e4}, &(0x7f0000002fc0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000003040)={r7, 0x10, &(0x7f0000003000)=[@in={0x2, 0x4e20, @loopback}]}, &(0x7f0000003080)=0x10) [ 234.795304] IPVS: ftp: loaded support on port[0] = 21 [ 235.057161] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.066285] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.073976] device bridge_slave_0 entered promiscuous mode 03:12:28 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x100) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000040)={0x100000001, "000800b5af15407d2297ccf901bbe9ba0045fcbd6d3764dbfef885bfb198cdc1", 0x1, 0x20, 0x3, 0x100000, 0x2}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r4 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={r2, r3, r4}, 0xc) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$alg(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000280)="dc4a", 0x2}], 0x1, &(0x7f0000000300)=[@iv={0x40, 0x117, 0x2, 0x2c, "99c127a29bf2704889caa30d258a89c40b72d4f704a4942fceb4622cac4720be6d7f1acdfec1ca50fd918e5d"}, @iv={0x50, 0x117, 0x2, 0x37, "20eb0a0ab59cf7b527b4554b3faa16936534d667e932eab2872d1d3b674cbbd7e1d5ad682cc467a456a47bb01b26f318b6bd19a3c08dd2"}, @op={0x18, 0x117, 0x3, 0x1}], 0xa8, 0x8000}, 0x40001) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) ioctl$VIDIOC_ENUMAUDIO(r6, 0xc0345641, &(0x7f0000000540)={0x2, "101af9eacf2eb96454356142ccf1e9dae69f4451868404a861eb3d19e94a60f7", 0x3, 0x1}) getsockopt$sock_int(r5, 0x1, 0x3b, &(0x7f0000000580), &(0x7f00000005c0)=0x4) syz_open_procfs$namespace(r2, &(0x7f0000000600)='ns/cgroup\x00') ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r6, 0xc0bc5310, &(0x7f0000000640)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000700)={'veth1_to_team\x00', 0x1101}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r5, 0x84, 0x1c, &(0x7f0000000740), &(0x7f0000000780)=0x4) connect$packet(r5, &(0x7f00000007c0)={0x11, 0x1c, r7, 0x1, 0x759b876b, 0x6, @remote}, 0x14) ioctl$SNDRV_TIMER_IOCTL_STATUS(r5, 0x80605414, &(0x7f0000000800)=""/77) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000880)={@in={{0x2, 0x4e21, @loopback}}, 0x1, 0x100, 0x3, "b586f9a5188d2be99752d1bfb61e93cc67a7c1af76f6e353bb984b561584c1318e12edb1b6be46907caa1ce2849439dc607a717213478e66532a2f56c304502549a841024f6c342a37473d59b278bc72"}, 0xd8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r5, &(0x7f0000000a40)={0xb0, 0xfffffffffffffff5, 0x7, [{{0x2, 0x2, 0x7, 0xffffffffffffff38, 0x4, 0x10000, {0x4, 0x1, 0xffffffffffff6189, 0x3c47, 0x9, 0xfffffffffffffffb, 0xc46d, 0x9, 0xfffffffffffffc00, 0xfff, 0x100000000, r8, r9, 0x4, 0x8}}, {0x6, 0x3, 0x1, 0xe0, "0e"}}]}, 0xb0) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000bc0)={0xffffffffffffffff}) mknod$loop(&(0x7f0000000c00)='./file0\x00', 0x1000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000c80)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000c40)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000cc0)={0x4, 0x8, 0xfa00, {r11, 0x1f}}, 0x10) sendto(r10, &(0x7f0000000d00)="7f932675054159cb88b15fc125f2a1406a0bdc6ec4e4a35a8ced91639fe88e09ce475ef57e6f774b02a541cbffc3b869f149f24105b6a9b0ae829dd1bb3a06782160572daaca9b8d004729aef05898b7f8fa73686f32383ac46a3b1353f128a0289e90e3f0ce9b39824c5796a885b2d1fd04e8ec83472bda9a9b3b78dfbf6cd29697ae36306c70e53263518eb6e7a923f3794257", 0x94, 0x10, &(0x7f0000000dc0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x80) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000e40)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @mcast2, 0x1}, r11}}, 0x30) getrandom(&(0x7f0000000e80)=""/250, 0xfa, 0x3) [ 235.227325] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.251439] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.263438] device bridge_slave_1 entered promiscuous mode [ 235.414646] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.421178] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.444596] device bridge_slave_0 entered promiscuous mode [ 235.452518] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.467460] IPVS: ftp: loaded support on port[0] = 21 [ 235.587606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 235.623710] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.630203] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.661081] device bridge_slave_1 entered promiscuous mode [ 235.842301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 235.889116] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.913343] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.920758] device bridge_slave_0 entered promiscuous mode [ 235.981739] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.014437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.043441] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.050187] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.068098] device bridge_slave_1 entered promiscuous mode [ 236.145884] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.187530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.336277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 236.397933] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.486866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.625273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 236.632275] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 236.654930] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.661357] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.689447] device bridge_slave_0 entered promiscuous mode [ 236.707563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 236.729207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.775540] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.836244] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.842726] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.859139] device bridge_slave_1 entered promiscuous mode [ 236.901927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.924140] team0: Port device team_slave_0 added [ 236.931096] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.997479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.067155] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.091553] team0: Port device team_slave_1 added [ 237.141350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.154101] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.161529] team0: Port device team_slave_0 added [ 237.228920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.258742] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.274834] team0: Port device team_slave_1 added [ 237.288698] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.303361] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.310760] device bridge_slave_0 entered promiscuous mode [ 237.403575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.411447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.506174] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.512648] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.521372] device bridge_slave_1 entered promiscuous mode [ 237.536364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.558502] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.579885] team0: Port device team_slave_0 added [ 237.585724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 237.592601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.602643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.611032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.624799] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.636817] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.673315] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.683358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 237.691440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.699421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.709461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.755954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.770694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.793795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.800981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.813693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.826632] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.834301] team0: Port device team_slave_1 added [ 237.841258] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.874930] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.895479] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.912959] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.934903] device bridge_slave_0 entered promiscuous mode [ 237.969463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 237.988819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.009920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.029762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 238.041452] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.048034] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.057043] device bridge_slave_1 entered promiscuous mode [ 238.069901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.097497] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.120795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.144210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.180548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.207677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.234686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.249259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.275466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.290109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.322606] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.344371] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.356617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.374847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.397565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.464911] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.592773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 238.612151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.713256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.720163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.744083] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.751516] team0: Port device team_slave_0 added [ 238.769195] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.819965] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.854259] team0: Port device team_slave_1 added [ 238.913893] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.969341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.999917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.016814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.039636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 239.060915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.095888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.141737] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.173477] team0: Port device team_slave_0 added [ 239.197386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 239.219347] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.237131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.328128] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.334685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.341733] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.348171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.388704] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.398373] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 239.423211] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.430684] team0: Port device team_slave_1 added [ 239.453682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.470653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.483668] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.490085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.496825] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.503230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.514228] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.554627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.570794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.614022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.664727] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.695220] team0: Port device team_slave_0 added [ 239.706678] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 239.723394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.740910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.818573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.829243] team0: Port device team_slave_1 added [ 239.841421] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 239.857185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.884508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.942740] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.957607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.968097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.005098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.013610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.021654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.047213] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.053648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.060335] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.066742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.104848] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.127567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 240.146868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.161571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.293308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.300467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.309253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.477124] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.489094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.499636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.563585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.990541] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.997019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.003773] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.010153] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.048353] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.491905] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.498359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.505080] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.511445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.524368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.573282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.584148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.945191] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.951582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.958344] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.964765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.003998] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.589932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.725280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.804706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.982418] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.226950] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.256544] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.435780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.661095] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.683177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.692162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.710602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.753614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.761737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.974575] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.981050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.003773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.144793] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.184342] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.455124] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.543288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.814774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.916615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.013941] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.306740] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.375344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.499879] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.507347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.517461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.819819] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.826750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.836289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.869089] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.896226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.913638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.046189] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.360252] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.396339] 8021q: adding VLAN 0 to HW filter on device team0 03:12:42 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20080, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0xee4, &(0x7f0000000080)=0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) capget(&(0x7f0000000140)={0x200f1526, r1}, &(0x7f0000000180)={0x5, 0x3, 0x2, 0x0, 0xff, 0x1}) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x1, 0x1, 0x7, 0x6, 0xd2, "bdfb2c53c3c69556537707a9c12fcec7c14e8820728b9787911110b3a25fbdadccf2c19b729674652fa0646d7bda68c708a19ed3137f563da92668c4b5fff9", 0x3e}, 0x60) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240), 0x4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000340)={0x9, 0xe0, [], {0x0, @reserved}}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000440)={0x6, &(0x7f0000000400)=[{}, {}, {}, {0x0}, {}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000480)={r6, 0x3}) r7 = getegid() r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x3, 0x995, 0xffff, 0xbf7c, 0x1, r0, 0x3}, 0x2c) r9 = syz_open_dev$sndmidi(&(0x7f0000000500)='/dev/snd/midiC#D#\x00', 0x1000, 0x200) ioctl$FS_IOC_GETFSLABEL(r8, 0x81009431, &(0x7f0000000540)) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x402000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) connect$can_bcm(r10, &(0x7f00000007c0)={0x1d, r11}, 0x10) setrlimit(0x8, &(0x7f0000000800)={0x500000000000000, 0x7}) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000840)=0xfffffffffffffffa, 0x4) setgid(r3) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000880)={0x1, 0x7, 0x2, 0x800, r0}) r13 = semget(0x1, 0x4, 0x220) semctl$IPC_SET(r13, 0x0, 0x1, &(0x7f00000008c0)={{0xce, r12, r7, r2, r3, 0x1, 0x1}, 0x3, 0x2c7, 0x196}) ioctl$LOOP_SET_STATUS(r10, 0x4c02, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x8, 0xb, 0x14, 0x11, "1ced5c3730ad81867e5b79707aaef623e86e8dba234c5a9b7bb9cec2b274ca23fe4646181bdc66feef688ba7a6f3f4b1721ff6780b1fb8f5b7046f6e2bf4eb58", "ae3cfd7a12cbc13fbb370918e0a6011d28b3356a9f1578be4130ff58e414c4da", [0x0, 0x80000000000000]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000a00)={r5, 0x1}) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000a40)={0x0, 0x7, 0xb832, 0x1, 0x1f, 0x401}) setxattr$trusted_overlay_nlink(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='trusted.overlay.nlink\x00', &(0x7f0000000b00)={'U-', 0x4}, 0x28, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r9, 0x29, 0x2a, &(0x7f0000000b40)={0x100, {{0xa, 0x4e21, 0x5, @ipv4={[], [], @multicast2}, 0x7fffffff}}}, 0x88) getsockopt$inet6_buf(r4, 0x29, 0x3f, &(0x7f0000000c00)=""/134, &(0x7f0000000cc0)=0x86) 03:12:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x400) fstat(r1, &(0x7f0000000240)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000600)=""/246) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{}]}) ioctl$EVIOCGREP(r2, 0x40107447, &(0x7f0000000000)=""/174) 03:12:42 executing program 0: io_setup(0x9, &(0x7f0000000000)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup2(r2, r2) sendmsg$kcm(r3, &(0x7f0000000140)={&(0x7f0000000040)=@nfc={0x27, 0x1, 0x2}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="8be6ea692fb67a9b4b335d11bd7615ccdad3af775a23341de5a671539f97d12d5f826cd33717", 0x26}, {&(0x7f0000000300)="ebd8dcb47b1872d4f2769b71454ce3802078f98d1beb6de3d228fcff6c1ef386472debf1d42f6b96c862a6605ae8ba74f1c4559c0ad7648f469d4b42a566059d885ee9f5f262e430dba1fd117484077b084c7eb33b9a49af8a3a8f4b71b731bbde78a83cdb5b9f545e43f872fdabf1b5e2e55992755b748e0ee1ba28b47b98412054e02c0540f1bf4b3414a3142c507d8e8ccdce41e2f51d6aa8b54123e307133a101c3a254f77f987867ecbffd39363f7be7857f92f4c5cf153add043cb999b63783c7217ea0c98d2fe2365", 0xcc}], 0x2, &(0x7f0000000400)=[{0x10, 0x29, 0x8}, {0xe8, 0x0, 0x5, "7c2b970b0cbd9c686e65e31bbc76166b7b5a058c3866279a70b4c9beb4fc90a0ca3350f75f57da909aa85dfc0573abdcc7057628d6adad4933ab8614e5bb2bf17320812aeff0b56df8aaf9406839c35e3e1aa03037804e075172be3d18c8e8e23ef6cf53100cab21da88c3a3203fad35564a126513f7eee2e7f84f85da4ef36281e84e76a0d952a62226d2d7ce5e2763e96b392812e34aa5252811359a49560e27d5cb2b57939aaeddc244d8f0f76f97e4aa9ce9555669c524d8001bf59cc81c8b4d82a12e638cdec02b5883614dad9086e17a4799db811f"}, {0x98, 0x88, 0x4, "aa61954e3280d6e95452050d81bd3144a556d131f9242f9719be2755bc433675a89d3625e2e238944a15c622d53f1e56a70d44025e09e45b84535e246b0fb0561bea0f63e82d28e4e74bd32ccf114dbf0d2a9eb4d7b6609459f4833729df3bf5652e6dc0bb69c68adfb774a5b7674b01fa5642507ad6a0d6286074dcb36c2070fc"}, {0x98, 0x10e, 0xb0ac000000000, "708f17f4119fd3d1ed2a86120bc52ad7e7ea657d593d9c685b6e6b5b0e0439e483ac7ba22293f1ca54a6554edb3f6994a9acad4b8682f9f00f3a1b63c3dfa390e6da38fa1f67abde8e80ce80d99dffce86320ac2354d842270a5159a3e881debdeedc76e0c9d0fb41d2b2639c2bdd6e6ed39c5184ae8b31b9efb2c7e131fbd0add"}, {0x28, 0x112, 0x80000000, "71aa97c2f04459443a2deb77d34acf0444"}, {0x20, 0x100, 0xe262, "4f3b91cc5dbbfce58f63278427f287"}, {0xe8, 0x3a, 0x3f, "b52b166dc8338a89312415aa4caab483fa36b227428d0d1d8555ddc903fcc1dc1e094b176f90e377980562ffece24506ba431ceaf21ee87b7688ca1d25acc4b2486a4befeb9e398d86d6edf85b0029c0520da5467ccaf28c89339bd784311d10046e2357934ce18cdc38f32a99f1a4259b62fb2a8eb3e470ef0b77e9e2b0fd200ac39bc2d8f179113317efaf3b07b4c1bdc388ea8bc3d618923eb0f6bd68190212ba27d316d226fee9b528f63e8410ee41e36b6edb80149173ebd0b931925fed297f83fd72ad2201493f7751a48b1e25d5eaf9c40d"}], 0x358, 0x20000000}, 0x0) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000200)=0x100000001, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x0, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 03:12:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x2, 0x0, @multicast2}, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}) 03:12:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xd3) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) close(r1) 03:12:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x20, 0x9, 0x9, [], &(0x7f0000000000)=0x3}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x0, [0x40000084]}) 03:12:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a07080005", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000008a80)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="c152dab104d0b1b57b0e7edeeda7c512a2a1c4cfdb3d737f833acf4e851f3973", 0x20}], 0x1}], 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x420080) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18) readv(r1, &(0x7f0000000d80)=[{&(0x7f0000000100)=""/29, 0x1d}, {&(0x7f0000000140)=""/12, 0xc}], 0x2) lseek(r0, 0x0, 0x3) [ 249.597290] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 249.624551] hrtimer: interrupt took 31584 ns 03:12:43 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000000c0)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = dup2(r0, r0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000000)) 03:12:43 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400340, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x400002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000080)) setitimer(0x2, &(0x7f0000000240)={{}, {0x0, r1/1000+30000}}, &(0x7f0000000280)) getitimer(0x2, &(0x7f0000000000)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x4000, 0x0) [ 250.734108] ntfs: (device loop4): parse_options(): Unrecognized mount option fscontext. [ 250.742718] ntfs: (device loop4): parse_options(): Unrecognized mount option mask. [ 250.751124] ntfs: (device loop4): parse_options(): Unrecognized mount option fscontext. [ 250.760008] ntfs: (device loop4): parse_options(): Unrecognized mount option dont_measure. [ 250.769362] ntfs: (device loop4): parse_options(): Unrecognized mount option euid>00000000000000000000. 03:12:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") rt_sigaction(0x2a, 0x0, &(0x7f0000000100)={&(0x7f0000000080)="470fdd6782460f1b7dfcc4a27d0e4808fcc4e2ad45cfc4012961fdc423f9091f006565660f59ad00500000c403f9153827660fc4e19a", {}, 0x0, &(0x7f00000000c0)="c4416a5c54b87d0fbaf3573e262e45efdadfc4a24940dcc4637d05b80600000000460f73f305c4011fd06906c4414574b200000000410f1a4c6335"}, 0x8, &(0x7f0000000140)) [ 250.791306] ntfs: (device loop4): parse_options(): Unrecognized mount option smackfstransmute. [ 250.814581] QAT: Invalid ioctl [ 250.827595] QAT: Invalid ioctl [ 250.834798] ntfs: (device loop4): parse_options(): Unrecognized mount option context. [ 250.839263] QAT: Invalid ioctl [ 250.846596] ntfs: (device loop4): parse_options(): Unrecognized mount option audit. [ 250.851011] QAT: Invalid ioctl [ 250.858878] ntfs: (device loop4): parse_options(): Unrecognized mount option euid>00000000000000000000. [ 250.868931] ntfs: (device loop4): parse_options(): Unrecognized mount option hash. [ 250.877879] QAT: Invalid ioctl [ 250.887357] QAT: Invalid ioctl [ 250.921442] 9pnet_virtio: no channels available for device system!ppp1+ [ 250.966251] QAT: Invalid ioctl [ 250.969669] QAT: Invalid ioctl [ 250.973600] QAT: Invalid ioctl [ 250.976852] QAT: Invalid ioctl 03:12:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) sendmsg$key(r0, &(0x7f0000000040)={0x20480, 0x1100000000000000, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="02000000070087c7fe8000000000000005001a00ffffffff000000000000000000000000ac1414aa"], 0x28}}, 0x0) 03:12:44 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x80400) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000180)={{0x0, 0x8}, 0x0, 0x800, 0x768, {0x80000001, 0x800}, 0x2, 0x3af}) write(r1, &(0x7f0000000000)='-', 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000140)={0x0, @aes256, 0x1, "12d5e2debd1698e1"}) 03:12:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xd3) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r1) close(r1) 03:12:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setrlimit(0x1ffffe, &(0x7f0000000040)={0x7, 0xd96}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 03:12:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0xfffffffffffffffc, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x1, 0x1, 0x0, 0x0, 0x3, 0x20000, 0x4, 0x2, 0x0, 0x7, 0x97b, 0x1, 0x0, 0x1, 0x1, 0x101, 0x8, 0x100, 0xfffffffffffffffd, 0x3, 0x7d, 0x3, 0xfffffffffffffff9, 0x1, 0x1ff, 0x1, 0x7fff80000000000, 0x4, 0x2, 0x9, 0x1ff, 0x1, 0x4, 0xfffffffffffffc01, 0xb40, 0x0, 0x73, 0x2, @perf_config_ext={0x0, 0x3}, 0x100, 0x40, 0x6, 0x0, 0x1000, 0x7fffffff, 0xffffffffffffffc1}, 0x0, 0x6, r0, 0x8) r1 = gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', r0}, 0x10) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000340)=@can, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)=""/56, 0x38}, {&(0x7f00000003c0)=""/167, 0xa7}, {&(0x7f0000000280)=""/31, 0x1f}, {&(0x7f0000000500)=""/88, 0x58}], 0x4, 0x0, 0x0, 0x7}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r0, 0x0, 0x98, 0x24, &(0x7f0000000600)="1dc42ba07cf5c5a061799cc782209f93b3dc585184d6dddf65a5a0468074769ed73141c6c7e6ee78d1d27289f8a034f8efe1c699c36360b2581a2c7aa3377bc9b5c83bc83792e2c41138b1a5a431e5aa02c74c37abb1b4fe1b7bb30509d186dd6ac661faf1e55a0e57ee8e64f28e31b52830a093d26f6c620233019066273728963dd0a7b02e5e143408dfd003ce272b7670f5d814cdf4ea", &(0x7f00000006c0)=""/36, 0x1}, 0x28) 03:12:44 executing program 3: syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000780)=r0, 0x4) [ 251.025244] QAT: Invalid ioctl [ 251.028607] QAT: Invalid ioctl 03:12:44 executing program 2: r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 251.111596] Dead loop on virtual device ip6_vti0, fix it urgently! 03:12:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f00000001c0)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000280)=ANY=[]) 03:12:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000001c0)={0x1, 0x0, [{}]}) [ 251.183131] Dead loop on virtual device ip6_vti0, fix it urgently! 03:12:44 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x1ff) 03:12:45 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000005c0)}, 0x20000004) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001340), 0x361, &(0x7f00000013c0)}, 0x20000054) 03:12:45 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00000004c0)=[{0x10, 0x116, 0x3}], 0x10}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@gettaction={0x28, 0x32, 0x801, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, @TCA_ACT_INDEX={0x8}}]}]}, 0x28}}, 0x0) [ 251.552574] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 03:12:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0xfffffffffffffffc, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x1, 0x1, 0x81, 0x0, 0x3, 0x20000, 0x4, 0x2, 0x0, 0x7, 0x97b, 0x1, 0x0, 0x1, 0x1, 0x101, 0x8, 0x0, 0xfffffffffffffffd, 0x3, 0x7d, 0x3, 0xfffffffffffffff9, 0x1, 0x0, 0x0, 0x7fff80000000000, 0x4, 0x2, 0x9, 0x1ff, 0x1, 0x0, 0xfffffffffffffc01, 0xb40, 0x0, 0x73, 0x2, @perf_config_ext, 0x100, 0x0, 0x6, 0x6, 0x1000, 0x7fffffff, 0xffffffffffffffc1}, r1, 0x6, r0, 0x8) r2 = gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r2, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) [ 251.628676] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 03:12:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x8}, &(0x7f0000000040)=0x10) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x19) 03:12:45 executing program 1: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000300)={0x0, @speck128}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004540), 0x0, 0x0, &(0x7f0000004640)={0x0, 0x989680}) 03:12:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f8, &(0x7f0000000180)={'sit0\x00', @ifru_mtu}) 03:12:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0xfffffffffffffffc, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x1, 0x1, 0x0, 0x0, 0x3, 0x20000, 0x4, 0x2, 0x0, 0x7, 0x97b, 0x1, 0x0, 0x1, 0x1, 0x101, 0x8, 0x100, 0xfffffffffffffffd, 0x3, 0x7d, 0x3, 0xfffffffffffffff9, 0x1, 0x1ff, 0x1, 0x7fff80000000000, 0x4, 0x2, 0x9, 0x1ff, 0x1, 0x4, 0xfffffffffffffc01, 0xb40, 0x0, 0x73, 0x2, @perf_config_ext={0x0, 0x3}, 0x100, 0x40, 0x6, 0x0, 0x1000, 0x7fffffff, 0xffffffffffffffc1}, 0x0, 0x6, r0, 0x8) r1 = gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', r0}, 0x10) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000340)=@can, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)=""/56, 0x38}, {&(0x7f00000003c0)=""/167, 0xa7}, {&(0x7f0000000280)=""/31, 0x1f}, {&(0x7f0000000500)=""/88, 0x58}], 0x4, 0x0, 0x0, 0x7}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r0, 0x0, 0x98, 0x24, &(0x7f0000000600)="1dc42ba07cf5c5a061799cc782209f93b3dc585184d6dddf65a5a0468074769ed73141c6c7e6ee78d1d27289f8a034f8efe1c699c36360b2581a2c7aa3377bc9b5c83bc83792e2c41138b1a5a431e5aa02c74c37abb1b4fe1b7bb30509d186dd6ac661faf1e55a0e57ee8e64f28e31b52830a093d26f6c620233019066273728963dd0a7b02e5e143408dfd003ce272b7670f5d814cdf4ea", &(0x7f00000006c0)=""/36, 0x1}, 0x28) 03:12:46 executing program 3: r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:12:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000004c0)=0x631a) 03:12:46 executing program 2: r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:12:46 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000001640)=""/4096) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000280)={{0x2, 0x4e24, @multicast2}, {0x306, @remote}, 0x2e, {0x2, 0x4e20, @multicast2}, 'veth0\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e22, @rand_addr=0x1}, 0x10) poll(&(0x7f0000000240)=[{r1}], 0x1, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001340)={'veth0_to_bond\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001480)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000014c0)={{{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4e24, 0x9, 0x4e23, 0x0, 0xa, 0x20, 0x0, 0x0, r3, r4}, {0x5, 0x97, 0x3fa5f2a4, 0x0, 0x0, 0x4, 0x2}, {0x8, 0x0, 0x8}, 0x0, 0x6e6bb2}, {{@in=@remote, 0x4d2, 0xff}, 0x2, @in6=@mcast2, 0x3500, 0x0, 0x3, 0x5, 0x0, 0x4615}}, 0xe8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000015c0)={'filter\x00', 0x4}, 0x68) close(r1) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:12:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0xfffffffffffffffc, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x1, 0x1, 0x0, 0x0, 0x3, 0x20000, 0x4, 0x2, 0x0, 0x7, 0x97b, 0x1, 0x0, 0x1, 0x1, 0x101, 0x8, 0x100, 0xfffffffffffffffd, 0x3, 0x7d, 0x3, 0xfffffffffffffff9, 0x1, 0x1ff, 0x1, 0x7fff80000000000, 0x4, 0x2, 0x9, 0x1ff, 0x1, 0x4, 0xfffffffffffffc01, 0xb40, 0x0, 0x73, 0x2, @perf_config_ext={0x0, 0x3}, 0x100, 0x40, 0x6, 0x0, 0x1000, 0x7fffffff, 0xffffffffffffffc1}, 0x0, 0x6, r0, 0x8) r1 = gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', r0}, 0x10) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000340)=@can, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)=""/56, 0x38}, {&(0x7f00000003c0)=""/167, 0xa7}, {&(0x7f0000000280)=""/31, 0x1f}, {&(0x7f0000000500)=""/88, 0x58}], 0x4, 0x0, 0x0, 0x7}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r0, 0x0, 0x98, 0x24, &(0x7f0000000600)="1dc42ba07cf5c5a061799cc782209f93b3dc585184d6dddf65a5a0468074769ed73141c6c7e6ee78d1d27289f8a034f8efe1c699c36360b2581a2c7aa3377bc9b5c83bc83792e2c41138b1a5a431e5aa02c74c37abb1b4fe1b7bb30509d186dd6ac661faf1e55a0e57ee8e64f28e31b52830a093d26f6c620233019066273728963dd0a7b02e5e143408dfd003ce272b7670f5d814cdf4ea", &(0x7f00000006c0)=""/36, 0x1}, 0x28) 03:12:46 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0xf3) r0 = inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) pipe2(&(0x7f0000000140), 0x0) fcntl$setown(r0, 0x8, 0x0) 03:12:46 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000001c0)="a0", 0x1}], 0x1, &(0x7f0000000800)}, 0x0) 03:12:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) getgroups(0x3, &(0x7f00000000c0)=[0xee00, 0xee00, 0xffffffffffffffff]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000a000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f00000001c0)="3ef00fc78b95cfb807008ee065650f06f36ebaf80c66b889c52e8f66efbafc0cec66b8186e00000f23d00f21f866350000000e0f23f80f01cbd03d670fc75d622e0f01cb", 0x44}], 0x1, 0x0, &(0x7f00000000c0), 0x340) 03:12:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f00000005c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) write$FUSE_ATTR(r1, &(0x7f0000000200)={0x78}, 0x78) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x4008006, 0x0, 0x275) sendto$inet6(r1, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) 03:12:47 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000001640)=""/4096) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000280)={{0x2, 0x4e24, @multicast2}, {0x306, @remote}, 0x2e, {0x2, 0x4e20, @multicast2}, 'veth0\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e22, @rand_addr=0x1}, 0x10) poll(&(0x7f0000000240)=[{r1}], 0x1, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001340)={'veth0_to_bond\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001480)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000014c0)={{{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4e24, 0x9, 0x4e23, 0x0, 0xa, 0x20, 0x0, 0x0, r3, r4}, {0x5, 0x97, 0x3fa5f2a4, 0x0, 0x0, 0x4, 0x2}, {0x8, 0x0, 0x8}, 0x0, 0x6e6bb2}, {{@in=@remote, 0x4d2, 0xff}, 0x2, @in6=@mcast2, 0x3500, 0x0, 0x3, 0x5, 0x0, 0x4615}}, 0xe8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000015c0)={'filter\x00', 0x4}, 0x68) close(r1) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 253.609770] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:12:47 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000001640)=""/4096) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000280)={{0x2, 0x4e24, @multicast2}, {0x306, @remote}, 0x2e, {0x2, 0x4e20, @multicast2}, 'veth0\x00'}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e22, @rand_addr=0x1}, 0x10) poll(&(0x7f0000000240)=[{r1}], 0x1, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001340)={'veth0_to_bond\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001480)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000014c0)={{{@in6=@mcast1, @in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4e24, 0x9, 0x4e23, 0x0, 0xa, 0x20, 0x0, 0x0, r3, r4}, {0x5, 0x97, 0x3fa5f2a4, 0x0, 0x0, 0x4, 0x2}, {0x8, 0x0, 0x8}, 0x0, 0x6e6bb2}, {{@in=@remote, 0x4d2, 0xff}, 0x2, @in6=@mcast2, 0x3500, 0x0, 0x3, 0x5, 0x0, 0x4615}}, 0xe8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000015c0)={'filter\x00', 0x4}, 0x68) close(r1) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 03:12:47 executing program 3: r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:12:47 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:12:47 executing program 2: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000480)={0x2001}) 03:12:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x2a2, 0x10400003) 03:12:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0xfffffffffffffffc, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x1, 0x1, 0x0, 0x0, 0x3, 0x20000, 0x4, 0x2, 0x0, 0x7, 0x97b, 0x1, 0x0, 0x1, 0x1, 0x101, 0x8, 0x100, 0xfffffffffffffffd, 0x3, 0x7d, 0x3, 0xfffffffffffffff9, 0x1, 0x1ff, 0x1, 0x7fff80000000000, 0x4, 0x2, 0x9, 0x1ff, 0x1, 0x4, 0xfffffffffffffc01, 0xb40, 0x0, 0x73, 0x2, @perf_config_ext={0x0, 0x3}, 0x100, 0x40, 0x6, 0x0, 0x1000, 0x7fffffff, 0xffffffffffffffc1}, 0x0, 0x6, r0, 0x8) r1 = gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', r0}, 0x10) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000340)=@can, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)=""/56, 0x38}, {&(0x7f00000003c0)=""/167, 0xa7}, {&(0x7f0000000280)=""/31, 0x1f}, {&(0x7f0000000500)=""/88, 0x58}], 0x4, 0x0, 0x0, 0x7}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r0, 0x0, 0x98, 0x24, &(0x7f0000000600)="1dc42ba07cf5c5a061799cc782209f93b3dc585184d6dddf65a5a0468074769ed73141c6c7e6ee78d1d27289f8a034f8efe1c699c36360b2581a2c7aa3377bc9b5c83bc83792e2c41138b1a5a431e5aa02c74c37abb1b4fe1b7bb30509d186dd6ac661faf1e55a0e57ee8e64f28e31b52830a093d26f6c620233019066273728963dd0a7b02e5e143408dfd003ce272b7670f5d814cdf4ea", &(0x7f00000006c0)=""/36, 0x1}, 0x28) 03:12:48 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d19ecd38b972a4220aae97", 0x21) sendfile(r0, r0, &(0x7f0000001000), 0x10002) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000003c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000400)) 03:12:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000004c0)=0x631a) 03:12:48 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 03:12:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xff43) prctl$intptr(0x1d, 0xfffffffffffff9cf) prctl$intptr(0x1e, 0x0) syz_execute_func(&(0x7f0000000080)="3666440f9bf56664400f9f3241c3c4e2c9975842c4c27d794e003e0f11581010196f04cd04cd0f2902") 03:12:48 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x00\x00\x00\x00\x00', 0x3) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, &(0x7f0000000280)=""/4096, &(0x7f0000001280)=0x1000) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000240)=0xc) futex(&(0x7f000000cffc), 0x1, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180), 0x0) fcntl$dupfd(r1, 0x406, r1) 03:12:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) getdents(r1, &(0x7f0000000280)=""/135, 0x347) 03:12:48 executing program 1: request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000400)='eth0\x00', 0xfffffffffffffffa) r0 = syz_open_procfs(0x0, &(0x7f0000000240)="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") mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000000000003, 0x12, r0, 0x0) clock_getres(0x0, &(0x7f0000000000)) sigaltstack(&(0x7f0000000000/0x13000)=nil, &(0x7f0000000080)) 03:12:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000001380)="696f005bfc57169bbbee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d485a0cb5617aa5bfb64c5f9983c25d024a9f3c489cc438f9e6de1635f672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e28104d262f889f390101ccaff805816603f65ba3df555b6c352cd7d84a7267a03436ba") pread64(r1, &(0x7f0000000080), 0x1ce, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:12:48 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f0000000000), 0x7) sendfile(r0, r0, &(0x7f0000000240), 0x2000005) 03:12:48 executing program 5: socketpair$unix(0x1, 0x10000000000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000540)='./file0\x00') readlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000005100)=""/158, 0x13f) 03:12:49 executing program 4: mknod(&(0x7f0000000140)='./file1\x00', 0x88, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f0000000b40)) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000080)) 03:12:49 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) readv(r1, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/104, 0x68}], 0x1) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x100, 0xd4e9) sendto$inet6(r1, &(0x7f0000000140)="030400000700000000000000fff55b1dfa938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053c0f385472da7222a2bb42f2dbd94c3b50035060f118d0000f55dc62600009b000000faffffff00000000aeb46245004bae1356642494a7b50200000000000000e664f65bfc370ad3409d8b02209463abcebdbc956953902a536879a76840abe2aa09e7a11c0c49175e4570b17751062758c0d541", 0xa4, 0x0, &(0x7f0000000040)={0xa, 0x200800800, 0x9, @dev}, 0x1c) 03:12:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x7fff, 0x4) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x3000006, 0x2011, r0, 0x0) 03:12:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/60, 0x3c}, {&(0x7f0000000100)=""/100, 0x64}, {&(0x7f0000000340)=""/138, 0x8a}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/42, 0x2a}, {&(0x7f0000000440)=""/88, 0x58}], 0x6) 03:12:49 executing program 3: 03:12:49 executing program 2: 03:12:49 executing program 5: 03:12:49 executing program 4: 03:12:49 executing program 3: 03:12:49 executing program 0: 03:12:49 executing program 3: 03:12:49 executing program 0: 03:12:49 executing program 4: 03:12:50 executing program 1: 03:12:50 executing program 5: 03:12:50 executing program 2: 03:12:50 executing program 3: 03:12:50 executing program 0: 03:12:50 executing program 4: 03:12:50 executing program 5: 03:12:50 executing program 2: 03:12:50 executing program 4: 03:12:50 executing program 0: 03:12:50 executing program 3: 03:12:50 executing program 2: 03:12:50 executing program 1: 03:12:50 executing program 5: 03:12:50 executing program 2: 03:12:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000340)=0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000004c0)=0x631a) 03:12:50 executing program 3: 03:12:50 executing program 4: 03:12:50 executing program 2: 03:12:50 executing program 5: 03:12:50 executing program 4: 03:12:50 executing program 1: 03:12:50 executing program 3: 03:12:50 executing program 0: 03:12:50 executing program 1: 03:12:50 executing program 4: 03:12:50 executing program 5: 03:12:50 executing program 2: 03:12:50 executing program 3: 03:12:50 executing program 0: 03:12:50 executing program 4: 03:12:50 executing program 1: 03:12:50 executing program 5: 03:12:50 executing program 2: 03:12:50 executing program 3: 03:12:50 executing program 0: 03:12:50 executing program 4: 03:12:50 executing program 5: 03:12:50 executing program 1: 03:12:50 executing program 2: 03:12:50 executing program 0: 03:12:51 executing program 3: 03:12:51 executing program 4: 03:12:51 executing program 2: 03:12:51 executing program 0: 03:12:51 executing program 5: 03:12:51 executing program 1: 03:12:51 executing program 3: 03:12:51 executing program 4: 03:12:51 executing program 5: 03:12:51 executing program 2: 03:12:51 executing program 1: 03:12:51 executing program 0: 03:12:51 executing program 4: 03:12:51 executing program 3: 03:12:51 executing program 5: 03:12:51 executing program 1: 03:12:51 executing program 3: 03:12:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000005c0)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000001c0)=0x800000001ff, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000540)={0x0, 0x3f, 0x0, 0x9, 0x9}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000580)={0x0, 0xc5, 0x8}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x8) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:12:51 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 03:12:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x423, &(0x7f000018f000)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "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"}}}}}, 0x0) 03:12:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) 03:12:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) 03:12:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x42, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0xfffffffffffff4d2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:12:51 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$setregset(0x4205, r1, 0x4, &(0x7f0000000000)={&(0x7f0000000140)="1952550cec71a20058ef8cbf5271023407621f6d0b3a652bf898474e418d3f26d5def55887393d0be9da77c5465428c17cfc2d995fb93a7d47a03ce7be0b36296679eab26130a5c97957e29804a69735654e800befebc7cb23197fe2ab8bcc2346d7158a5f4d8bc18f6bcdcfd86f643f8fb967fc885c33d644ad98bff7540327da061290836ba256e7e2451e76514640", 0x90}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) connect(r2, &(0x7f0000000080)=@nfc, 0x71) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1004000000016) [ 258.011569] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:12:51 executing program 4: syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6c6f6361ec526c6f636b732c00"]) r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000000)=""/144) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x3, 0x100) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0xf2, 0xe03, "0724212a2d7c88162478837f613843aa48e610c58b77a313e335f2a61d51153c5a63cc537d953718b1e93f12818a7c340c573bb1252ebe69e3dec18764370368df18d62ca4104268067cd892dbb6b8e7bc4bb6c1e8a4f63e9c0cd9f444c6a5413bd2c853c92950a736a59423104db291bb8252f4e71da18ba6b929ddf9872ee034236573eb680de8a7be75b7eeffbb9277c2bbba413e9be79d95f5cbf339bb59e8e6ed2ee6a069a7b9035ef9ff3dc24676c22e180d891b490bb305456a3b16c5ebbbc6b4db648db3424181361cf108b35aab5c557a032f56cd84745813f3ffff74479b0f95897cfe243d"}, &(0x7f00000002c0), 0x1400) 03:12:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mount$9p_xen(&(0x7f00000000c0)='selinux{[--.(trusted\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x4, 0x580) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000400)=0x2) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) fstat(r0, &(0x7f0000000540)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.SMACK64IPIN\x00', &(0x7f0000000240)='selinux{[--.(trusted\x00', 0x15, 0x3) [ 258.159937] gfs2: invalid mount option: locaìRlocks [ 258.171440] gfs2: can't parse mount arguments [ 258.216503] gfs2: invalid mount option: locaìRlocks [ 258.260294] gfs2: can't parse mount arguments 03:12:51 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:52 executing program 4: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85714070") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6370752f73797a3102", 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000380)={0x200000000000003, 0x7ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) socket$inet6(0xa, 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000540)={0x7ff, 0x0, 0xfffffffffffffeff, 0x5, 0x0, 0x3f}) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 03:12:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r0, 0x3) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, &(0x7f0000000200)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) 03:12:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={"65716c0000000000eaffff0400e61000", 0x800000000008005}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x306) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) 03:12:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000005c0)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000001c0)=0x800000001ff, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000540)={0x0, 0x3f, 0x0, 0x9, 0x9}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000580)={0x0, 0xc5, 0x8}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000040)=0x8) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:12:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setfsgid(0x0) mkdir(&(0x7f0000004080)='./file0\x00', 0xfffffffffffdffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003dc0)=[{{&(0x7f0000003cc0)=@alg, 0x80, 0xfffffffffffffffe, 0x0, &(0x7f0000003d40)=""/128, 0x80}}], 0x1, 0x0, &(0x7f0000003f40)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001a80)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1, 0x1}}, 0x0, 0x6, 0x101, 0x0, 0x53}, &(0x7f0000001b40)=0x98) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001c00)) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x2000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000240)=0x101, 0x8) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="5b55fb9c64a7d64c00007d6428485bf964bcf78a462f7235f9b6eb2e3ce0fbae9adf6de41daf2ddaccea066170e519d0c2b11f9293732d28e6b8b771dfb341f16d7d1fd5c7c6e4dfeeafa2c719dbe030710bc41e64ca32d6eab386d687184b34b253af13bb35708b76009da8"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)='\x00') ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000300)=0x8) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000180)=0x10) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xff) 03:12:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:52 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 259.228996] ceph: device name is missing path (no : separator in [Uûœd§ÖL) [ 259.243206] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:12:52 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x266, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x7fff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={r1, 0x4, 0x40, 0x9, 0x4, 0x20, 0x3, 0x0, {r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x0, 0x6, 0x7, 0x9}}, &(0x7f0000000240)=0xb0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000004c0)={'team_slave_0\x00', &(0x7f0000000480)=@ethtool_ts_info}) [ 259.295010] ceph: device name is missing path (no : separator in [Uûœd§ÖL) 03:12:53 executing program 0: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @local, 0x0, 0x0, "64680000f0ff7c97ac76b6eecbfa00"}, 0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x100f}}, 0x20) dup3(r0, r0, 0x0) r3 = add_key(&(0x7f0000000500)='logon\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)="c967c8e66b00c1a4ab9ef4a1def388446eedf50fc354ead58ce46db6daeaa8ed3d983325aa38587ab24c33b533e9d9c25e750fd962f3b346c04f0fca6ac206d06b790bd346d031822d954fad214c76d07cefbb27090efd420b92c7396edbd52f5cf5a394517aeaebee44326d80debc2ffd98941e6413fd790d57", 0x7a, 0xfffffffffffffffd) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)='minix\x00', r3) r4 = syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x6, 0x200000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f0000000400)) r5 = open(&(0x7f0000000380)='./file0\x00', 0x2000, 0x10) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r2, 0x52, "2f67d8", "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"}}, 0x110) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="8851594b093dcbb900d88dff39875b7de6cdf4e7fc5e4d3f5fda634e10dc15e7401557812ffa433dda33bee13867b5b37e6f4b3fd59e645c93b51c82e68f40654b0f476dce19332515737b78121a9bccab505410d7fd7a83323d970429fd41e905a953536df84ed52b88f9d8aa9ae7bd615555848b69f869a79a0e87fa15333a11b7eecc28fcde8f2496b5732e1d5497c7faf13f1ee479981196f0e95177ad8de0b719e1296f8360070589584bb0bec086c677a65d75ab1c", 0xb8, 0x6}], 0x200000, 0x0) 03:12:53 executing program 4: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85714070") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6370752f73797a3102", 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000380)={0x200000000000003, 0x7ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) socket$inet6(0xa, 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000540)={0x7ff, 0x0, 0xfffffffffffffeff, 0x5, 0x0, 0x3f}) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 03:12:53 executing program 3: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85714070") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6370752f73797a3102", 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000380)={0x200000000000003, 0x7ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) socket$inet6(0xa, 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000540)={0x7ff, 0x0, 0xfffffffffffffeff, 0x5, 0x0, 0x3f}) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 03:12:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mount$9p_xen(&(0x7f00000000c0)='selinux{[--.(trusted\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x4, 0x580) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000400)=0x2) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) fstat(r0, &(0x7f0000000540)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.SMACK64IPIN\x00', &(0x7f0000000240)='selinux{[--.(trusted\x00', 0x15, 0x3) 03:12:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="153f6234") mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000d80), r1, &(0x7f0000000dc0), 0x0, 0x5) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000440)={{0x7, 0x7, 0x401, 0x0, '\x00', 0x2}, 0x0, 0x0, 0x3f, r2, 0x1, 0x0, 'syz1\x00', &(0x7f0000000140)=['overlay\x00'], 0x8, [], [0x3, 0x480, 0xffffffffffff7fff, 0x1]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x1, &(0x7f0000000940)=[{&(0x7f00000008c0)="003e7bbb044fa408fbbd824d1be13659165a1bb3c9a0711e39dd2f4e8f993f2b893d154b8e4a492fca59642b23177477524ff755d9be8c24cce036be8934a2c01e5134b45dfeb3490010597d35b5a0ea931165559928e7f4e964ed4a34812cbba55b8953f5accd31dec04dd73753", 0x6e, 0x6}], 0x30000, &(0x7f0000000580)=ANY=[@ANYBLOB="66730000006d5f752c008fbb385a3a03e8ac5bb0531929b73435ae369fd5faf527a1235cb6207a443a59278e5b569c62030ba22aba4addc094036699b86e57b13c89d74a570aec0e7decbb0be65efb96c9292d8999736a486adcff63cb17eddb8b766d5050da1d09629d7e671d2a9e8c20b76d846beb74bd61fd1b86623e244e94187c83cf7fc9f3640fd109cf1b4b386e57cfac844b914d0a9058aa7303335cdf00bf2790aa410cb00eaa35e2bd0dd16fb83d3fe31dbe8b39f8e9b99c60875309b8502536489fe4d67210b12d37865f13d9a0788b33fcd035a35db52022ee65"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fec3bbd3d48d38a6e5f725074b96c09fe25bf1dc72c440a644a00ef677fd"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5, 0x81}) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fallocate(r3, 0x40, 0x44, 0x81000f3) 03:12:53 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 260.293062] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 03:12:54 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mount$9p_xen(&(0x7f00000000c0)='selinux{[--.(trusted\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r1 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x4, 0x580) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000400)=0x2) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) fstat(r0, &(0x7f0000000540)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.SMACK64IPIN\x00', &(0x7f0000000240)='selinux{[--.(trusted\x00', 0x15, 0x3) [ 260.356993] overlayfs: failed to resolve './file1': -2 03:12:54 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:54 executing program 4: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85714070") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6370752f73797a3102", 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000380)={0x200000000000003, 0x7ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) socket$inet6(0xa, 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000540)={0x7ff, 0x0, 0xfffffffffffffeff, 0x5, 0x0, 0x3f}) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) [ 260.860508] __ntfs_error: 12 callbacks suppressed [ 260.860518] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:12:54 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:54 executing program 3: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85714070") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6370752f73797a3102", 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000380)={0x200000000000003, 0x7ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) socket$inet6(0xa, 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000540)={0x7ff, 0x0, 0xfffffffffffffeff, 0x5, 0x0, 0x3f}) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) [ 261.025108] overlayfs: failed to resolve './file1': -2 03:12:55 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x10d, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:55 executing program 4: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85714070") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000180)=0x8) gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6370752f73797a3102", 0x1ff) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000380)={0x200000000000003, 0x7ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="2e2f6367726f75702e6e65742f73797a312775ca1e56b82a6b2c9610345bf0841f9c0102ea8317e1c2fd7ad819a4e039", 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000000)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) socket$inet6(0xa, 0x2, 0x3) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000540)={0x7ff, 0x0, 0xfffffffffffffeff, 0x5, 0x0, 0x3f}) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 03:12:55 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x100000000000000, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="153f6234") mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, &(0x7f0000000d80), r1, &(0x7f0000000dc0), 0x0, 0x5) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000440)={{0x7, 0x7, 0x401, 0x0, '\x00', 0x2}, 0x0, 0x0, 0x3f, r2, 0x1, 0x0, 'syz1\x00', &(0x7f0000000140)=['overlay\x00'], 0x8, [], [0x3, 0x480, 0xffffffffffff7fff, 0x1]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x1, &(0x7f0000000940)=[{&(0x7f00000008c0)="003e7bbb044fa408fbbd824d1be13659165a1bb3c9a0711e39dd2f4e8f993f2b893d154b8e4a492fca59642b23177477524ff755d9be8c24cce036be8934a2c01e5134b45dfeb3490010597d35b5a0ea931165559928e7f4e964ed4a34812cbba55b8953f5accd31dec04dd73753", 0x6e, 0x6}], 0x30000, &(0x7f0000000580)=ANY=[@ANYBLOB="66730000006d5f752c008fbb385a3a03e8ac5bb0531929b73435ae369fd5faf527a1235cb6207a443a59278e5b569c62030ba22aba4addc094036699b86e57b13c89d74a570aec0e7decbb0be65efb96c9292d8999736a486adcff63cb17eddb8b766d5050da1d09629d7e671d2a9e8c20b76d846beb74bd61fd1b86623e244e94187c83cf7fc9f3640fd109cf1b4b386e57cfac844b914d0a9058aa7303335cdf00bf2790aa410cb00eaa35e2bd0dd16fb83d3fe31dbe8b39f8e9b99c60875309b8502536489fe4d67210b12d37865f13d9a0788b33fcd035a35db52022ee65"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fec3bbd3d48d38a6e5f725074b96c09fe25bf1dc72c440a644a00ef677fd"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5, 0x81}) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fallocate(r3, 0x40, 0x44, 0x81000f3) [ 262.277129] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:12:56 executing program 5: syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x2) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000209000/0x3000)=nil, 0x3000}, 0x1}) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f000034afa4)=""/1, 0x2c8}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) close(r0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000040)}, 0x20) r3 = socket$inet_sctp(0x2, 0x1, 0x84) mlockall(0x2) sendto$inet(r3, &(0x7f0000000000)='H', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 03:12:56 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ff0000/0xd000)=nil, 0xd000}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000006c0)={@empty, @mcast2, @remote, 0x3, 0x38e, 0x7f, 0x400, 0x80, 0x2200100, r1}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0xfffffffffffffffc, 0x1, 0x200, 0x96, 0x7, 0x5, 0x1, 0x0, r2}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f0000000040)=""/173) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r6, &(0x7f0000000040), 0x8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) listen(r6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={0x0, r5}, 0x14) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x4e20, 0x6, @remote, 0x465}, @in6={0xa, 0x4e22, 0x101, @empty, 0xffff}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x0, 0x8, @mcast1, 0x3}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x8}], 0xb0) bind$bt_sco(r0, &(0x7f00000003c0)={0x1f, {0xffffffffffffff2d, 0x7, 0xffff, 0x6, 0x6, 0x9}}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xd3, "7f542abd95f17096a63289a574f12e65a102ef9ec085ee76e9ac162bbe7d24c1855877e6f9a90d0dfda70887df5d727519fbba6a5845cefec9f38fb9d1d7bd11154d320c2f79d87ab74270ebca45c30cff43ff693fddfbc78d58f4a461351374f6a77a689bbe819ab8f942a3334910dc43f1199f581fda840e5c312d15ad15be276881168b1826d520e3f9c90c73b2cfd656ebd0dfc584eb36fa8f9fcdc15ed2818eed7a2b6f5fa490efe68d1f340a5672fa5f9697d635e244d66ba902e65364ac848037be470c04e200ef78c3c7a2c6cf40db"}, &(0x7f0000000100)=0xdb) accept$unix(r6, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x10000) 03:12:56 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd01000000000000, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:56 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000003c0), 0x7d) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000600)={0x0, 0x7, 0x6, 0xf0, &(0x7f0000000400)=""/240, 0xfffffdca, &(0x7f0000000380)=""/63, 0xf8, &(0x7f0000000500)=""/248}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x9f000000, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x1, {0x0, 0x3, 0xfffffffffffffffc}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 03:12:56 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f00000000c0)="c1dfebfcba1a521ca1fc15226046555aed36130d75dd786ae9b37335f5dbeaf5f13ac7b96a1bfe21e7371310997670440d94a4981c46bb580986c123dac3eb89e6d05757044642899d82b085b2dde584ed7b33aa70701077d5b7a9e1b7c2ddbf8f5a0ebf7db184835aea148f5b385a4f719fbfd101c2083f6bc3c633eb061f9d4e546270a90e285a39891e9e2165b03e11bae75a0da1c665631400e0beb639913d8339ecc183eeb4e22d937bda64a8e01818346db537379c499625aa2adab207b401449f9ca2a815e7a1c395ed9a8263a97b1dc34b79ae07db92f60f4d13dd690cb7d72969aa0b2148", 0xe9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)}}, {{0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0025000080"], 0x10}}], 0x2, 0x0) 03:12:56 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) sendto(r0, &(0x7f00000000c0), 0x0, 0x1, &(0x7f0000000000)=@ethernet={0x0, @local}, 0x21) 03:12:56 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1000000, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:56 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ff0000/0xd000)=nil, 0xd000}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000006c0)={@empty, @mcast2, @remote, 0x3, 0x38e, 0x7f, 0x400, 0x80, 0x2200100, r1}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0xfffffffffffffffc, 0x1, 0x200, 0x96, 0x7, 0x5, 0x1, 0x0, r2}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f0000000040)=""/173) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r6, &(0x7f0000000040), 0x8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) listen(r6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={0x0, r5}, 0x14) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x4e20, 0x6, @remote, 0x465}, @in6={0xa, 0x4e22, 0x101, @empty, 0xffff}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x0, 0x8, @mcast1, 0x3}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x8}], 0xb0) bind$bt_sco(r0, &(0x7f00000003c0)={0x1f, {0xffffffffffffff2d, 0x7, 0xffff, 0x6, 0x6, 0x9}}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xd3, "7f542abd95f17096a63289a574f12e65a102ef9ec085ee76e9ac162bbe7d24c1855877e6f9a90d0dfda70887df5d727519fbba6a5845cefec9f38fb9d1d7bd11154d320c2f79d87ab74270ebca45c30cff43ff693fddfbc78d58f4a461351374f6a77a689bbe819ab8f942a3334910dc43f1199f581fda840e5c312d15ad15be276881168b1826d520e3f9c90c73b2cfd656ebd0dfc584eb36fa8f9fcdc15ed2818eed7a2b6f5fa490efe68d1f340a5672fa5f9697d635e244d66ba902e65364ac848037be470c04e200ef78c3c7a2c6cf40db"}, &(0x7f0000000100)=0xdb) accept$unix(r6, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x10000) 03:12:56 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd010000, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x19, 0x240082) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000080)={0x1e46, 0x4116, 0x2}) fadvise64(r0, 0x0, 0x0, 0x4) 03:12:56 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f00000000c0)={0x5, 0x96f, 0x8, 0x0, 0x17}) sendfile(r3, r4, 0x0, 0x1) 03:12:56 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd01, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:57 executing program 5: setitimer(0x1, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000080)) setitimer(0x1, &(0x7f0000000180)={{0x0, 0x2710}, {0x77359400}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0124fefeddc0f01eea873fe1903fafa0f38211af3f081768cc8000000c4a3e90e9a000000008567f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000d00)) gettid() r0 = gettid() getpgrp(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14, 0x0) select(0x40, &(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000980)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@local, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@remote}}, &(0x7f0000000640)=0xe8) getuid() quotactl(0x0, &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000840)) socket$inet6(0xa, 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000009c0)=""/146) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast2, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000680)) sendmsg(r1, &(0x7f0000000cc0)={&(0x7f0000000b80)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000c00)="758d9944c815d8dba09a51fcdf3b81a2467136ccb180b0456c350d6db4fea8e6", 0x20}, {&(0x7f0000000c40)="56e5568a8f74e7234e06bcbaa6b524640f88b44ef10a0566cdaf94ae63ea422b9fa26e396bca5d66df6b3351307fe4bd976e08a75dc9420cd391cc1224", 0x3d}], 0x2, 0x0, 0x0, 0x800}, 0x40) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f00000006c0)={0x7}, 0x7) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000940)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a80)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000006240)={&(0x7f0000000280), 0xc, &(0x7f0000006200)={&(0x7f0000000980)=ANY=[]}}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/83) pipe(&(0x7f0000000240)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0xffffffffffffff28) add_key(&(0x7f0000000ac0)='dns_resolver\x00', &(0x7f0000000b00), &(0x7f0000000b40), 0x0, 0xfffffffffffffffe) rt_sigpending(&(0x7f0000000b40), 0x8) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000003, 0x10010, r2, 0x0) 03:12:57 executing program 4: clone(0xfffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000180)={{0x100, 0xfffffffffffffffe}, 'port1\x00', 0x4, 0x11000, 0x2, 0x7, 0x8f7f, 0x4, 0x31696f2e, 0x0, 0x2, 0x800}) ptrace(0x4206, r0) tkill(r0, 0xb) waitid(0x0, 0x0, &(0x7f0000000140), 0x100000a, &(0x7f0000000080)) 03:12:57 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f00000000c0)={0x5, 0x96f, 0x8, 0x0, 0x17}) sendfile(r3, r4, 0x0, 0x1) 03:12:57 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xd, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:57 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f00000000c0)={0x5, 0x96f, 0x8, 0x0, 0x17}) sendfile(r3, r4, 0x0, 0x1) 03:12:57 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x32, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000680)=0xe8) r2 = socket$inet6(0xa, 0xf, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@broadcast, @local}, 0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x100}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @dev}]}, &(0x7f0000000400)=0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000380)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in6=@mcast2, 0x4e23, 0xffffffff80000001, 0x4e22, 0x6, 0xa, 0x80, 0x80, 0xc, r1, r3}, {0x0, 0x5, 0xfffffffffffffb2b, 0x1000, 0x3, 0x0, 0x8, 0x8}, {0x8, 0x90, 0x0, 0x8000}, 0x9e1, 0x6e6bc0, 0x2, 0x0, 0x3, 0x1}, {{@in=@rand_addr, 0x4d2, 0x2b}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x4536, 0x2, 0x2, 0x39e}}, 0xe8) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x20000, 0x0) mq_notify(r4, &(0x7f0000000200)={0x0, 0x18, 0x4, @thr={&(0x7f0000000440)="544b1bf4f99e0ba4e7ef39398b5aa59d8f66545473cbce99117ae36ed2fcbec3e86c86347444c046f0e5d0ef5e86e61cdfb85d6674370f98f3ccab64fcc0d7b9666ec0fab945da65f1fcbd5a07d21fb6da4f9056042eb821a0df18eb6ebe48302e28c6d77f51bc1ad62163", &(0x7f00000004c0)="bbc0449ccf4055677dccbf414ea14a000fadb558c5bba291c0dd9f54b13282b145d666015fe991ff28576a33e50f18bf3233e611522ddbc4eb0627478f109a9b772bf4d44283901f557e0e7cc7ae9294aa1cef4095b079d2b9527caff6ecc82318d5fdcaff60595509d1d6e686fcfa63f43ec5961d00f129f7644d6e651465d3d42af4ec97daa46404d204435a0cb6e5c6a3167bab0840179530dc5f61a5ffd4958b816621fdd2b6b5a38509d5ad793a7d28df11948a"}}) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) 03:12:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ff0000/0xd000)=nil, 0xd000}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000006c0)={@empty, @mcast2, @remote, 0x3, 0x38e, 0x7f, 0x400, 0x80, 0x2200100, r1}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0xfffffffffffffffc, 0x1, 0x200, 0x96, 0x7, 0x5, 0x1, 0x0, r2}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f0000000040)=""/173) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r6, &(0x7f0000000040), 0x8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) listen(r6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={0x0, r5}, 0x14) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x4e20, 0x6, @remote, 0x465}, @in6={0xa, 0x4e22, 0x101, @empty, 0xffff}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x0, 0x8, @mcast1, 0x3}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x8}], 0xb0) bind$bt_sco(r0, &(0x7f00000003c0)={0x1f, {0xffffffffffffff2d, 0x7, 0xffff, 0x6, 0x6, 0x9}}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xd3, "7f542abd95f17096a63289a574f12e65a102ef9ec085ee76e9ac162bbe7d24c1855877e6f9a90d0dfda70887df5d727519fbba6a5845cefec9f38fb9d1d7bd11154d320c2f79d87ab74270ebca45c30cff43ff693fddfbc78d58f4a461351374f6a77a689bbe819ab8f942a3334910dc43f1199f581fda840e5c312d15ad15be276881168b1826d520e3f9c90c73b2cfd656ebd0dfc584eb36fa8f9fcdc15ed2818eed7a2b6f5fa490efe68d1f340a5672fa5f9697d635e244d66ba902e65364ac848037be470c04e200ef78c3c7a2c6cf40db"}, &(0x7f0000000100)=0xdb) accept$unix(r6, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x10000) 03:12:57 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_matches\x00') ioctl$void(r0, 0xc0045c79) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x4d, "3e85177d6bcf96382e1f7dacb3ef02ce516886d0722b75579ef2970e9f27626a48152102b14763032482fb33ddd44c57f1bfe8defea1e1ee6a0569c039c2bd3d0697ae8dc0a69444957b14b2ca"}, &(0x7f00000000c0)=0x55) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1}, 0x8) close(r0) 03:12:57 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb5, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000140)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x9, 0x1, 0x5, 0x25, 0x8, [{0x9, 0x100000001, 0xffffffffffffff01, 0x0, 0x0, 0x2}, {0x5, 0x61aa428f, 0x81, 0x0, 0x0, 0x800}, {0x1, 0xffffffffffff672b, 0x8000, 0x0, 0x0, 0x1}, {0x0, 0x9, 0x200, 0x0, 0x0, 0x4}, {0x1f2, 0x7f, 0xfffffffffffffff9, 0x0, 0x0, 0x2}, {0x9, 0x4, 0x6f, 0x0, 0x0, 0x8}, {0x7038, 0x84cc, 0x3, 0x0, 0x0, 0x120e}, {0x2, 0x3ff, 0x45ad, 0x0, 0x0, 0x2000}]}) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000080)) ioctl$int_in(r0, 0x800000c004500a, &(0x7f00000000c0)) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000000)) 03:12:57 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x21, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f00000000c0)="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") syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000200)={0xc0000000, 0x10f, "4d9b73c9cab01c344df213c8e21371414100ea5633e87ab4178e3ea7eb6c53fe", 0x4, 0x8, 0x8c, 0x1, 0x10000, 0x9, 0x2, 0x10000, [0x0, 0x6, 0x1, 0x101]}) 03:12:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b40)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfcfd, &(0x7f0000000180), 0x0, &(0x7f0000000700), 0x365}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$peek(0xffffffffffffffff, r2, &(0x7f0000000180)) socket$inet6(0xa, 0x1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000440)={0x0, 0x8, 0xe08c}) 03:12:58 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7ff0700000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) set_mempolicy(0x3, &(0x7f00000000c0)=0x80000000, 0x0) io_setup(0x0, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000100)='oom_adj\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080)={0x2, 0xfffffffffffffffc}, 0x8) exit(0x0) 03:12:58 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) splice(r1, &(0x7f00000002c0), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) io_setup(0x5b7, &(0x7f0000000040)=0x0) io_submit(r5, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0xf0, 0xf0000000000000, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x1d, r4, 0xfffffffffffffffc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x101, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x7000) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x2, 0x1}) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r8 = getuid() fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x8, 0x8}, {0x80000001}], r8}, 0x18, 0x0) syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x80003) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000280)={0x36f, 0x7}) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) 03:12:58 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:12:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000680)=0xe8) r2 = socket$inet6(0xa, 0xf, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@broadcast, @local}, 0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x100}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @dev}]}, &(0x7f0000000400)=0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000380)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in6=@mcast2, 0x4e23, 0xffffffff80000001, 0x4e22, 0x6, 0xa, 0x80, 0x80, 0xc, r1, r3}, {0x0, 0x5, 0xfffffffffffffb2b, 0x1000, 0x3, 0x0, 0x8, 0x8}, {0x8, 0x90, 0x0, 0x8000}, 0x9e1, 0x6e6bc0, 0x2, 0x0, 0x3, 0x1}, {{@in=@rand_addr, 0x4d2, 0x2b}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x4536, 0x2, 0x2, 0x39e}}, 0xe8) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x20000, 0x0) mq_notify(r4, &(0x7f0000000200)={0x0, 0x18, 0x4, @thr={&(0x7f0000000440)="544b1bf4f99e0ba4e7ef39398b5aa59d8f66545473cbce99117ae36ed2fcbec3e86c86347444c046f0e5d0ef5e86e61cdfb85d6674370f98f3ccab64fcc0d7b9666ec0fab945da65f1fcbd5a07d21fb6da4f9056042eb821a0df18eb6ebe48302e28c6d77f51bc1ad62163", &(0x7f00000004c0)="bbc0449ccf4055677dccbf414ea14a000fadb558c5bba291c0dd9f54b13282b145d666015fe991ff28576a33e50f18bf3233e611522ddbc4eb0627478f109a9b772bf4d44283901f557e0e7cc7ae9294aa1cef4095b079d2b9527caff6ecc82318d5fdcaff60595509d1d6e686fcfa63f43ec5961d00f129f7644d6e651465d3d42af4ec97daa46404d204435a0cb6e5c6a3167bab0840179530dc5f61a5ffd4958b816621fdd2b6b5a38509d5ad793a7d28df11948a"}}) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) 03:12:58 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x6, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ff0000/0xd000)=nil, 0xd000}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000006c0)={@empty, @mcast2, @remote, 0x3, 0x38e, 0x7f, 0x400, 0x80, 0x2200100, r1}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0xfffffffffffffffc, 0x1, 0x200, 0x96, 0x7, 0x5, 0x1, 0x0, r2}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f0000000040)=""/173) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r6, &(0x7f0000000040), 0x8) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) listen(r6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={0x0, r5}, 0x14) clone(0x1002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000900)=[@in6={0xa, 0x4e20, 0x6, @remote, 0x465}, @in6={0xa, 0x4e22, 0x101, @empty, 0xffff}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x0, 0x8, @mcast1, 0x3}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x8}], 0xb0) bind$bt_sco(r0, &(0x7f00000003c0)={0x1f, {0xffffffffffffff2d, 0x7, 0xffff, 0x6, 0x6, 0x9}}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0xd3, "7f542abd95f17096a63289a574f12e65a102ef9ec085ee76e9ac162bbe7d24c1855877e6f9a90d0dfda70887df5d727519fbba6a5845cefec9f38fb9d1d7bd11154d320c2f79d87ab74270ebca45c30cff43ff693fddfbc78d58f4a461351374f6a77a689bbe819ab8f942a3334910dc43f1199f581fda840e5c312d15ad15be276881168b1826d520e3f9c90c73b2cfd656ebd0dfc584eb36fa8f9fcdc15ed2818eed7a2b6f5fa490efe68d1f340a5672fa5f9697d635e244d66ba902e65364ac848037be470c04e200ef78c3c7a2c6cf40db"}, &(0x7f0000000100)=0xdb) accept$unix(r6, &(0x7f0000000840)=@abs, &(0x7f0000000740)=0xfffffffffffffe90) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x10000) 03:12:58 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:12:58 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xa, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:58 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:58 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:12:58 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 265.164690] syz-executor2 (7997) used greatest stack depth: 15368 bytes left 03:12:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) splice(r1, &(0x7f00000002c0), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) io_setup(0x5b7, &(0x7f0000000040)=0x0) io_submit(r5, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0xf0, 0xf0000000000000, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x1d, r4, 0xfffffffffffffffc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x101, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x7000) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x2, 0x1}) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r8 = getuid() fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x8, 0x8}, {0x80000001}], r8}, 0x18, 0x0) syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x80003) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000280)={0x36f, 0x7}) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) 03:12:59 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x31, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:59 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:59 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:12:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0xffffffffffffffda, 0x3}, 0x10) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x2, 0x8, 0x0, 0xfffffffffffffffc}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x80000) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x0, @mcast2, 0x4000000000000000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000240)={0x4, [0x401, 0x7, 0x0, 0x2]}, 0xc) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x8001, @remote, 0x1f}}}, 0x84) mmap(&(0x7f00002e5000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) 03:12:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) splice(r1, &(0x7f00000002c0), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) io_setup(0x5b7, &(0x7f0000000040)=0x0) io_submit(r5, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0xf0, 0xf0000000000000, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x1d, r4, 0xfffffffffffffffc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x101, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x7000) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x2, 0x1}) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r8 = getuid() fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x8, 0x8}, {0x80000001}], r8}, 0x18, 0x0) syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x80003) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000280)={0x36f, 0x7}) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) 03:12:59 executing program 5: r0 = timerfd_create(0x7, 0x0) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 265.736853] audit: type=1800 audit(1540869179.342:31): pid=8049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16633 res=0 03:12:59 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:59 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 265.934100] audit: type=1804 audit(1540869179.372:32): pid=8049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir808907686/syzkaller.lWPNSz/42/file0" dev="sda1" ino=16633 res=1 03:12:59 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x2, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:12:59 executing program 3: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 266.223100] audit: type=1800 audit(1540869179.382:33): pid=8049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16633 res=0 03:12:59 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 3: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x22, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) splice(r1, &(0x7f00000002c0), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/130) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) io_setup(0x5b7, &(0x7f0000000040)=0x0) io_submit(r5, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0xf0, 0xf0000000000000, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x1d, r4, 0xfffffffffffffffc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x101, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x7000) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x2, 0x1}) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r8 = getuid() fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x8, 0x8}, {0x80000001}], r8}, 0x18, 0x0) syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x80003) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000280)={0x36f, 0x7}) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) [ 266.822417] audit: type=1804 audit(1540869180.432:34): pid=8060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir808907686/syzkaller.lWPNSz/42/file0" dev="sda1" ino=16633 res=1 [ 266.852557] audit: type=1800 audit(1540869180.432:35): pid=8060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16633 res=0 [ 266.932182] audit: type=1804 audit(1540869180.542:36): pid=8097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir808907686/syzkaller.lWPNSz/42/file0" dev="sda1" ino=16633 res=1 [ 266.960845] audit: type=1800 audit(1540869180.542:37): pid=8097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16633 res=0 03:13:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0xffffffffffffffda, 0x3}, 0x10) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x2, 0x8, 0x0, 0xfffffffffffffffc}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x80000) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x3, {0xa, 0x4e23, 0x0, @mcast2, 0x4000000000000000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000240)={0x4, [0x401, 0x7, 0x0, 0x2]}, 0xc) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0x8001, @remote, 0x1f}}}, 0x84) mmap(&(0x7f00002e5000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) 03:13:00 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x4, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 3: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 5: timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(0xffffffffffffffff, &(0x7f0000a16000)=""/71, 0x47) [ 267.154426] syz-executor0 (8049) used greatest stack depth: 15112 bytes left 03:13:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:00 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:00 executing program 2: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)="0a5cc8070031afa8b40a08d5bd805d55438ca8ca2fb3b088626fc887ca8cdaf34f4b3dfc7281f3a8267ad879e68792") openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) epoll_create(0x1) write$FUSE_POLL(r1, &(0x7f0000000140)={0x18, 0x0, 0x0, {0x1ff}}, 0x18) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000100)={@multicast1, @local}, 0xc) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) r3 = mq_open(&(0x7f0000000080)='bdev\x00', 0x41, 0xc4, &(0x7f00000000c0)={0x3f, 0x6, 0x94, 0xffffffff, 0x3, 0x10000, 0x1, 0x7}) mq_timedsend(r3, &(0x7f0000000000)="e1bd6cd0afde34321df09a6d21a196923c8789fbec2ea693ba8964b3fe243e2d42cdc1b9eef3721daa36ba559839d6", 0x2f, 0x6, &(0x7f0000000040)={0x1000000000, 0x989680}) mq_timedsend(r3, &(0x7f0000000240)="73b3cafec3dbd277099115feb843043bcd21914a3dd770451ca1844af1702112de1c7734850769393d14c839755a14d817df51fee3f9c0eb552a2c2ed1587ddc4541f459edf88ac4aeb604daa86338ecf4a9ac6ff010cf7c5811", 0x5a, 0x5, &(0x7f00000001c0)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r2, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYBLOB="8300000016d45041858856dc4d387b4f52080378ffffff7fffffffff32f4d8561b6d867f3f42c418daa5f6219bdb5f088beb0a48afecf2b741f79032b35760a6112546ce45da07121f92afae57b9dfcc7d37fcd4214c040a07b346ddeeccef6b27454e341dbaa774142d89d945a7b417cca5c943bd5ec5d80e2b2a4ff6ed179285fda4d53f81ddf40e35a39a6a66b2d55485c2fc6bd2303c0f2e34e18910e04b0a2e2bc418861e18081835f36e293bad37f262665169e4593367fa282e0502c0641a6b5dd944770d8b1ab6da35d1bafc8abfa88f2713cac42f17bbb9e27240369e17fcb3f27b0205344824fdec28c887ba"], &(0x7f0000000180)=0x1) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={0x0, 0x7, 0x8}, 0x8) 03:13:00 executing program 4: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 267.280606] syz-executor2 (8096) used greatest stack depth: 15080 bytes left 03:13:00 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x60, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 267.335902] audit: type=1800 audit(1540869180.932:38): pid=8114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16637 res=0 [ 267.376529] audit: type=1804 audit(1540869180.982:39): pid=8114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir808907686/syzkaller.lWPNSz/43/file0" dev="sda1" ino=16637 res=1 03:13:01 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:01 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 267.442987] audit: type=1800 audit(1540869180.982:40): pid=8114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16637 res=0 [ 267.613944] audit: type=1804 audit(1540869181.222:41): pid=8130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir808907686/syzkaller.lWPNSz/43/file0" dev="sda1" ino=16637 res=1 03:13:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) mbind(&(0x7f0000ff4000/0xb000)=nil, 0xb000, 0x0, &(0x7f0000000280)=0xfffffffffffffffc, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000240)={0x0, 0x54, &(0x7f0000000180)="ccd6a5dbbfb62c8b1dc7b0a6232006a2d7b7b22d764f6ed0965058e45397291a51304cd0331ad55a0c24e5706bc89979f5961d3a62d8c005c19cf8d8f861743aa447511f68b334800e12c565e1e9b5b96e6c48ff"}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000580)=r1) fsetxattr(r0, &(0x7f0000000040)=@known='security.ima\x00', &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x26, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x2000) shutdown(r2, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240020000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x4000) 03:13:01 executing program 4: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:01 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x18, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:01 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:01 executing program 2: capset(&(0x7f0000000240)={0x20071026}, &(0x7f00000003c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1c}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 03:13:01 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x9, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 268.165373] capability: warning: `syz-executor2' uses deprecated v2 capabilities in a way that may be insecure 03:13:01 executing program 4: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:01 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x1b4) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001380), &(0x7f00000013c0)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000300), 0x118, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:13:01 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 268.356547] kernel msg: ebtables bug: please report to author: Wrong len argument 03:13:02 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 268.601258] kernel msg: ebtables bug: please report to author: Wrong len argument 03:13:02 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x100000004, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000080)={0xc, {0x3, 0x1, 0x8d, 0x7fff}}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4800, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x3, 0x1}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0585605, &(0x7f0000000180)={0x0, 0x1, 0x0, [], &(0x7f0000000100)={0x0, 0x0, [], @p_u8=&(0x7f00000000c0)}}) socket$inet6_tcp(0xa, 0x1, 0x0) 03:13:02 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x17, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd01000000000000, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000002a7b0000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000010100000000000000000000000000000000000000000000000000feffffff0100000011000000090000000000000000000081000000000000000000006c6f0000000000000000000000000000726f0000000000000000000b00000000467dac2e895fc5d400000024347b6e8255b476b6e1827f00b75f001a4b0000000000000005000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000400000000000000000005f000000000000000000000008000000000000000a00000000000000"]}, 0x1b4) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001380), &(0x7f00000013c0)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000300), 0x118, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:13:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1000000, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:02 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x100000004, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000080)={0xc, {0x3, 0x1, 0x8d, 0x7fff}}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4800, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x3, 0x1}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0585605, &(0x7f0000000180)={0x0, 0x1, 0x0, [], &(0x7f0000000100)={0x0, 0x0, [], @p_u8=&(0x7f00000000c0)}}) socket$inet6_tcp(0xa, 0x1, 0x0) [ 268.807799] kernel msg: ebtables bug: please report to author: Wrong len argument 03:13:02 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xb, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd010000, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(0xffffffffffffffff, &(0x7f0000a16000)=""/71, 0x47) 03:13:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./control\x00', 0x1) r1 = inotify_init() inotify_add_watch(r1, &(0x7f000003a000)='./control\x00', 0x81000100) 03:13:02 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd01, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r2 = gettid() timer_create(0x8000000007, &(0x7f00000004c0)={0x0, 0x10000000000022f, 0x4, @thr={&(0x7f0000000340)="8ccb09d034a0bc2a635a1e41d8331110d11dab1adbea03e6fcf4cd19dcc242597ce90e9555d4622f36a4b7dc2440e673137037ec0687a29119324336497f340ae8261f3641da89fc96c8c8ce3d6fb545a449839b33c2d93af6a75099ef36afcfb56966cad5c20f7131b52aef20613887313ad391dba871cbea5ed51c", &(0x7f00000003c0)="f4813722831c06cb140411c9f0b130087e970f38809755d589ac605e76201d68bf1c8591240d7cbba70d4d24d746da7335496e6a81936a"}}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000040)=""/204, 0x5d}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 03:13:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xe, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 5 (fault-call:2 fault-nth:0): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:02 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x10d, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x3, 0x0, 0x0, {}, [@nested={0xc, 0x7, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000ac0)='wlan0&\\\x00', 0xffffffffffffffff}, 0x30) fstat(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, &(0x7f0000000c00)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c40)={0x0}, &(0x7f0000000c80)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000cc0)={0x0, 0x0}, &(0x7f0000000d00)=0xc) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000e00)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e40)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000f40)=0xe8) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@broadcast, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001140)=0xe8) stat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = fcntl$getown(r0, 0x9) r19 = getuid() getresgid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)=0x0) ioctl$EXT4_IOC_RESIZE_FS(r5, 0x40086610, &(0x7f0000001380)=0x81) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000900)={'veth0_to_bond\x00', 0x2}) r21 = fcntl$getown(r0, 0x9) r22 = openat$mixer(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/mixer\x00', 0x101040, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r22, 0x29, 0x23, &(0x7f0000000800)={{{@in=@broadcast, @in, 0x4e24, 0x4, 0x4e23, 0x8, 0xa, 0x20, 0x20, 0x21, r15, r12}, {0x6, 0x80, 0x1, 0x8, 0x7fffffff, 0x0, 0xffffffffffffff52, 0x72}, {0x3, 0x8001, 0x75b2, 0x3b873af3}, 0x2a4c, 0x6e6bbe, 0x3, 0x1, 0x3}, {{@in6=@local, 0x4d5, 0x6f}, 0xa, @in6=@mcast2, 0x0, 0x4, 0x3, 0x9b02, 0x3c178413, 0x1, 0x400}}, 0xe8) r23 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001300)={0x0, 0x0, 0x0}, &(0x7f0000001340)=0xc) r25 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$netlink(r0, &(0x7f0000002ac0)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc, &(0x7f0000000a80)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="2000000010000d0129bd7000fedbdf670800320000000000080036001f000000"], 0x20}, {&(0x7f0000000200)={0xcc, 0x16, 0x4, 0x70bd26, 0x25dfdbfb, "", [@generic="fee8a4a1a7d79453ff87a852e297c925a4313ce5f27401b1cdd5406821754f77ee7f6b9cbb146df4ff73e5da11536a29be8f51186f98ef3b0ad71c877263f104ac3450472bcd0007545097799f9c95b01e7c294f0877fedc652795a6ceae26a531d89bf27f22374738051420fc906fa3f2b95cbd8bd8ccf28c0c8c516d70270434143726d83fd85e68a21736637bed598c", @typed={0x14, 0xb, @ipv6=@local}, @typed={0xc, 0xf, @u64=0x7}, @typed={0x8, 0x35, @u32=0x4}]}, 0xcc}, {&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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"], 0x3e0}, {&(0x7f00000013c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="6551acb697e84fc286355df7b446faa69e829f694742a4d25486c0b96030cef35f44b47d93f5066669d2df38d2661db9897e55fb5d3861de3c85ed1000660047504c73656c696e7578000008004c00", @ANYRES32=r3, @ANYBLOB="fb2e171bd6b3dcc8942df4278ac872e3bf595107da2bddfc971b6d2c030b44b0716c6dcd2344c6c0e46f8975cc22033e4fee8644651c2441ee59da42662764a87f9c63a5abb4fd660fc816a9b36a1206b44343ed8e26650a965fa582758af4e55ccd3ce798e45b3968d99179a85b79f464e3efbc916fb24674950c9f000000"], 0x284}], 0x4, &(0x7f0000002980)=[@cred={0x20, 0x1, 0x2, r4, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r21, r23, r24}, @rights={0x28, 0x1, 0x1, [r0, r0, r25, r0, r0, r0]}], 0x110, 0x84}, 0x4) 03:13:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x13, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 269.338696] FAULT_INJECTION: forcing a failure. [ 269.338696] name fail_page_alloc, interval 1, probability 0, space 0, times 1 03:13:03 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x100000000000000, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 269.390114] CPU: 1 PID: 8247 Comm: syz-executor5 Not tainted 4.19.0-next-20181029+ #100 [ 269.398310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.407683] Call Trace: [ 269.410383] dump_stack+0x244/0x39d [ 269.414055] ? dump_stack_print_info.cold.1+0x20/0x20 [ 269.419337] should_fail.cold.4+0xa/0x17 [ 269.423431] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.423558] ? print_usage_bug+0xc0/0xc0 [ 269.423583] ? __lock_acquire+0x62f/0x4c20 [ 269.423637] ? kasan_check_read+0x11/0x20 [ 269.423658] ? __lock_acquire+0x62f/0x4c20 [ 269.432969] ? print_usage_bug+0xc0/0xc0 [ 269.432991] ? __lock_acquire+0x62f/0x4c20 [ 269.433012] ? print_usage_bug+0xc0/0xc0 [ 269.433026] ? mark_held_locks+0x130/0x130 [ 269.433064] ? __lock_acquire+0x62f/0x4c20 [ 269.433086] ? print_usage_bug+0xc0/0xc0 [ 269.470647] __alloc_pages_nodemask+0x34b/0xdd0 [ 269.475354] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 269.480405] ? __lock_acquire+0x62f/0x4c20 [ 269.484676] ? __lock_acquire+0x62f/0x4c20 03:13:03 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x21, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 269.488947] ? mark_held_locks+0x130/0x130 [ 269.493197] ? mark_held_locks+0x130/0x130 [ 269.497524] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 269.503084] alloc_pages_vma+0x11e/0x4a0 [ 269.507166] do_huge_pmd_anonymous_page+0x57e/0x2150 [ 269.507194] ? __thp_get_unmapped_area+0x180/0x180 [ 269.507282] ? ima_match_policy+0x848/0x1560 [ 269.507304] ? print_usage_bug+0xc0/0xc0 [ 269.526100] ? print_usage_bug+0xc0/0xc0 [ 269.530179] ? kasan_check_read+0x11/0x20 [ 269.534409] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 03:13:03 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xa, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 269.539717] ? __lock_acquire+0x62f/0x4c20 [ 269.543967] ? find_held_lock+0x36/0x1c0 [ 269.548070] ? __lock_acquire+0x62f/0x4c20 [ 269.552327] ? __lock_acquire+0x62f/0x4c20 [ 269.556576] ? mark_held_locks+0x130/0x130 [ 269.560838] ? mark_held_locks+0x130/0x130 [ 269.565085] ? mark_held_locks+0x130/0x130 [ 269.569333] ? print_usage_bug+0xc0/0xc0 [ 269.573417] ? print_usage_bug+0xc0/0xc0 [ 269.577487] ? up_write+0x7b/0x220 [ 269.581142] __handle_mm_fault+0x3c91/0x5be0 [ 269.585590] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 269.590454] ? print_usage_bug+0xc0/0xc0 [ 269.594533] ? mark_held_locks+0x130/0x130 [ 269.598793] ? print_usage_bug+0xc0/0xc0 [ 269.602885] ? zap_class+0x640/0x640 [ 269.606637] ? zap_class+0x640/0x640 [ 269.610379] ? zap_class+0x640/0x640 [ 269.614147] ? find_held_lock+0x36/0x1c0 [ 269.618234] ? handle_mm_fault+0x42a/0xc70 [ 269.622484] ? lock_downgrade+0x900/0x900 [ 269.626718] ? check_preemption_disabled+0x48/0x280 [ 269.631757] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 269.636708] ? kasan_check_read+0x11/0x20 03:13:03 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x13, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:03 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xc, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 269.640872] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 269.646163] ? rcu_softirq_qs+0x20/0x20 [ 269.650244] ? trace_hardirqs_off_caller+0x300/0x300 [ 269.655371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.660924] ? check_preemption_disabled+0x48/0x280 [ 269.665966] handle_mm_fault+0x54f/0xc70 [ 269.670087] ? __handle_mm_fault+0x5be0/0x5be0 [ 269.674701] ? find_vma+0x34/0x190 [ 269.678340] __do_page_fault+0x5d6/0xe40 [ 269.682434] do_page_fault+0xed/0x7d1 [ 269.686244] ? vmalloc_sync_all+0x30/0x30 [ 269.686303] ? error_entry+0x76/0xd0 [ 269.686325] ? trace_hardirqs_off_caller+0xbb/0x300 [ 269.699191] ? find_held_lock+0x36/0x1c0 [ 269.699264] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.699286] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.713214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.718084] page_fault+0x1e/0x30 [ 269.721591] RIP: 0010:__put_user_8+0x1c/0x25 [ 269.726039] Code: 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 07 48 39 d9 73 0c 0f 1f 00 <48> 89 01 31 c0 0f 1f 00 c3 b8 f2 ff ff ff 0f 1f 00 c3 90 90 55 48 [ 269.744960] RSP: 0018:ffff88017d657a50 EFLAGS: 00010293 [ 269.750338] RAX: 0000000000000001 RBX: 00007fffffffeff9 RCX: 0000000020a16000 [ 269.757617] RDX: 00000000000000f4 RSI: ffffffff81b17393 RDI: 0000000000000286 [ 269.764898] RBP: ffff88017d657b68 R08: 1ffff1002facaf27 R09: 0000000000000008 [ 269.772178] R10: 0000000000000001 R11: ffff88018815e240 R12: 0000000000000000 [ 269.779131] netlink: 'syz-executor2': attribute type 7 has an invalid length. [ 269.779462] R13: 0000000000000001 R14: ffff8801cc8840c8 R15: ffff8801cc884110 [ 269.779495] ? __might_fault+0x1a3/0x1e0 [ 269.779590] ? timerfd_read+0x856/0xc50 [ 269.794075] ? do_timerfd_settime+0x1000/0x1000 [ 269.794094] ? lock_downgrade+0x900/0x900 [ 269.794115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.794162] ? proc_fail_nth_write+0x9e/0x210 [ 269.794187] ? proc_cwd_link+0x1d0/0x1d0 [ 269.802217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.802282] ? fsnotify+0x4e5/0xf20 [ 269.802346] __vfs_read+0x117/0x9b0 [ 269.830749] netlink: 'syz-executor2': attribute type 7 has an invalid length. [ 269.834335] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 269.834352] ? do_timerfd_settime+0x1000/0x1000 [ 269.834371] ? vfs_copy_file_range+0xb90/0xb90 [ 269.834392] ? fsnotify+0xf20/0xf20 [ 269.863201] ? security_file_permission+0x1c2/0x220 [ 269.868249] ? rw_verify_area+0x118/0x360 [ 269.872421] vfs_read+0x17f/0x3c0 [ 269.875895] ksys_read+0x101/0x260 [ 269.879445] ? kernel_write+0x120/0x120 [ 269.883438] ? trace_hardirqs_off_caller+0x300/0x300 [ 269.888562] __x64_sys_read+0x73/0xb0 [ 269.892386] do_syscall_64+0x1b9/0x820 [ 269.896284] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.901673] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.906633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.911514] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.916560] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.921594] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.926889] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.931732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.936909] RIP: 0033:0x457569 [ 269.940091] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.958985] RSP: 002b:00007f85e4e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 269.966694] RAX: ffffffffffffffda RBX: 00007f85e4e26c90 RCX: 0000000000457569 [ 269.973964] RDX: 0000000000000047 RSI: 0000000020a16000 RDI: 0000000000000003 [ 269.981241] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 269.988505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f85e4e276d4 [ 269.995792] R13: 00000000004c2850 R14: 00000000004d5150 R15: 0000000000000004 03:13:05 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000080)=0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x42) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x10001, 0x10}, &(0x7f00000001c0)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x7, 0x1, [0x3]}, 0xa) io_cancel(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000100)) 03:13:05 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x22, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:05 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:05 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000040)) ioctl$FICLONE(r0, 0x40049409, r1) 03:13:05 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd01, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:05 executing program 5 (fault-call:2 fault-nth:1): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 272.361913] FAULT_INJECTION: forcing a failure. [ 272.361913] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 272.397999] CPU: 1 PID: 8288 Comm: syz-executor5 Not tainted 4.19.0-next-20181029+ #100 [ 272.406249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.415611] Call Trace: [ 272.418217] dump_stack+0x244/0x39d [ 272.421871] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.427104] should_fail.cold.4+0xa/0x17 [ 272.431178] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.436295] ? zap_class+0x640/0x640 [ 272.440021] ? zap_class+0x640/0x640 [ 272.443765] ? find_held_lock+0x36/0x1c0 [ 272.447854] ? __lock_is_held+0xb5/0x140 [ 272.451995] ? nfc_llcp_register_device+0x168/0xc10 [ 272.457051] ? rcu_softirq_qs+0x20/0x20 [ 272.461051] ? lock_release+0xa10/0xa10 [ 272.465082] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.470559] ? __might_sleep+0x95/0x190 [ 272.474554] __alloc_pages_nodemask+0x34b/0xdd0 [ 272.479261] ? mem_cgroup_throttle_swaprate+0x270/0x884 [ 272.484646] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 272.489693] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 272.494635] ? kasan_check_read+0x11/0x20 [ 272.498794] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.504085] ? rcu_softirq_qs+0x20/0x20 [ 272.508090] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.514123] ? mem_cgroup_throttle_swaprate+0x2eb/0x884 [ 272.519497] ? swap_duplicate+0x80/0x80 [ 272.523487] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 272.529054] alloc_pages_current+0x173/0x350 [ 272.533482] pte_alloc_one+0x1b/0x1a0 [ 272.537295] do_huge_pmd_anonymous_page+0x785/0x2150 [ 272.542420] ? __thp_get_unmapped_area+0x180/0x180 [ 272.547367] ? ima_match_policy+0x848/0x1560 [ 272.551791] ? print_usage_bug+0xc0/0xc0 [ 272.555863] ? print_usage_bug+0xc0/0xc0 [ 272.559931] ? kasan_check_read+0x11/0x20 [ 272.564090] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.569385] ? __lock_acquire+0x62f/0x4c20 [ 272.573629] ? find_held_lock+0x36/0x1c0 [ 272.577719] ? __lock_acquire+0x62f/0x4c20 [ 272.581962] ? __lock_acquire+0x62f/0x4c20 [ 272.586208] ? mark_held_locks+0x130/0x130 [ 272.590469] ? mark_held_locks+0x130/0x130 [ 272.594716] ? mark_held_locks+0x130/0x130 [ 272.598957] ? print_usage_bug+0xc0/0xc0 [ 272.603042] ? print_usage_bug+0xc0/0xc0 [ 272.607112] ? up_write+0x7b/0x220 [ 272.610685] __handle_mm_fault+0x3c91/0x5be0 [ 272.615121] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 272.619979] ? print_usage_bug+0xc0/0xc0 [ 272.624060] ? mark_held_locks+0x130/0x130 [ 272.628306] ? print_usage_bug+0xc0/0xc0 [ 272.632384] ? zap_class+0x640/0x640 [ 272.636122] ? zap_class+0x640/0x640 [ 272.639844] ? zap_class+0x640/0x640 [ 272.643578] ? find_held_lock+0x36/0x1c0 [ 272.647660] ? handle_mm_fault+0x42a/0xc70 [ 272.651909] ? lock_downgrade+0x900/0x900 [ 272.656071] ? check_preemption_disabled+0x48/0x280 [ 272.661105] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 272.666054] ? kasan_check_read+0x11/0x20 [ 272.670209] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 272.675492] ? rcu_softirq_qs+0x20/0x20 [ 272.679475] ? trace_hardirqs_off_caller+0x300/0x300 [ 272.684590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.690136] ? check_preemption_disabled+0x48/0x280 [ 272.695170] handle_mm_fault+0x54f/0xc70 [ 272.699245] ? __handle_mm_fault+0x5be0/0x5be0 [ 272.703845] ? find_vma+0x34/0x190 [ 272.707398] __do_page_fault+0x5d6/0xe40 [ 272.711481] do_page_fault+0xed/0x7d1 [ 272.715290] ? vmalloc_sync_all+0x30/0x30 [ 272.719447] ? error_entry+0x76/0xd0 [ 272.723173] ? trace_hardirqs_off_caller+0xbb/0x300 [ 272.728205] ? find_held_lock+0x36/0x1c0 [ 272.732276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.737131] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.742178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.747048] page_fault+0x1e/0x30 [ 272.750517] RIP: 0010:__put_user_8+0x1c/0x25 [ 272.754945] Code: 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 07 48 39 d9 73 0c 0f 1f 00 <48> 89 01 31 c0 0f 1f 00 c3 b8 f2 ff ff ff 0f 1f 00 c3 90 90 55 48 [ 272.773857] RSP: 0018:ffff880187b67a50 EFLAGS: 00010293 [ 272.779226] RAX: 0000000000000001 RBX: 00007fffffffeff9 RCX: 0000000020a16000 [ 272.786502] RDX: 00000000000000f4 RSI: ffffffff81b17393 RDI: 0000000000000286 [ 272.793776] RBP: ffff880187b67b68 R08: 1ffff10030f6cf27 R09: 0000000000000008 [ 272.801057] R10: 0000000000000001 R11: ffff880187c002c0 R12: 0000000000000000 [ 272.808332] R13: 0000000000000001 R14: ffff8801bbed8b48 R15: ffff8801bbed8b90 [ 272.815637] ? __might_fault+0x1a3/0x1e0 [ 272.819716] ? timerfd_read+0x856/0xc50 [ 272.823710] ? do_timerfd_settime+0x1000/0x1000 [ 272.828394] ? lock_downgrade+0x900/0x900 [ 272.832561] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.838111] ? proc_fail_nth_write+0x9e/0x210 [ 272.842622] ? proc_cwd_link+0x1d0/0x1d0 [ 272.846705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.852250] ? fsnotify+0x4e5/0xf20 [ 272.855899] __vfs_read+0x117/0x9b0 [ 272.859536] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 272.864479] ? do_timerfd_settime+0x1000/0x1000 [ 272.869158] ? vfs_copy_file_range+0xb90/0xb90 [ 272.873758] ? fsnotify+0xf20/0xf20 [ 272.877415] ? security_file_permission+0x1c2/0x220 [ 272.882452] ? rw_verify_area+0x118/0x360 [ 272.886611] vfs_read+0x17f/0x3c0 [ 272.890086] ksys_read+0x101/0x260 [ 272.893666] ? kernel_write+0x120/0x120 [ 272.897708] ? trace_hardirqs_off_caller+0x300/0x300 [ 272.902846] __x64_sys_read+0x73/0xb0 [ 272.906673] do_syscall_64+0x1b9/0x820 [ 272.910571] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.915949] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.920884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.925750] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.930775] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.935804] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.940836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.945706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.950906] RIP: 0033:0x457569 [ 272.954108] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.973018] RSP: 002b:00007f85e4e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 272.980750] RAX: ffffffffffffffda RBX: 00007f85e4e26c90 RCX: 0000000000457569 [ 272.988027] RDX: 0000000000000047 RSI: 0000000020a16000 RDI: 0000000000000003 [ 272.995311] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 273.002582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f85e4e276d4 [ 273.009857] R13: 00000000004c2850 R14: 00000000004d5150 R15: 0000000000000004 03:13:06 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x16, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:06 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x8, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:06 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x10d, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000480), 0xc, &(0x7f00000001c0)={&(0x7f00000006c0)=ANY=[]}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[]}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000200)={0x28, 0x8}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="10000000002ac8e96402bedc7892"], 0xe) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x1}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000280)=0x7) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xffffffffffffff3b, 0x4) 03:13:06 executing program 5 (fault-call:2 fault-nth:2): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:06 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 273.201632] FAULT_INJECTION: forcing a failure. [ 273.201632] name failslab, interval 1, probability 0, space 0, times 1 [ 273.222557] CPU: 0 PID: 8309 Comm: syz-executor5 Not tainted 4.19.0-next-20181029+ #100 [ 273.230722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.240084] Call Trace: [ 273.242695] dump_stack+0x244/0x39d [ 273.246346] ? dump_stack_print_info.cold.1+0x20/0x20 [ 273.251560] ? kasan_check_read+0x11/0x20 [ 273.255723] should_fail.cold.4+0xa/0x17 [ 273.255740] ? check_preemption_disabled+0x48/0x280 [ 273.255758] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.269943] ? check_preemption_disabled+0x48/0x280 [ 273.274994] ? __lock_is_held+0xb5/0x140 [ 273.279119] ? zap_class+0x640/0x640 [ 273.282848] ? find_held_lock+0x36/0x1c0 [ 273.286921] ? __lock_is_held+0xb5/0x140 [ 273.291001] ? perf_trace_sched_process_exec+0x860/0x860 [ 273.296507] __should_failslab+0x124/0x180 [ 273.300826] should_failslab+0x9/0x14 [ 273.304635] kmem_cache_alloc+0x2be/0x730 [ 273.308788] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 273.314337] ptlock_alloc+0x20/0x80 [ 273.317973] pte_alloc_one+0x6b/0x1a0 [ 273.321802] do_huge_pmd_anonymous_page+0x785/0x2150 [ 273.326921] ? __thp_get_unmapped_area+0x180/0x180 [ 273.331858] ? ima_match_policy+0x848/0x1560 [ 273.336277] ? print_usage_bug+0xc0/0xc0 [ 273.340349] ? print_usage_bug+0xc0/0xc0 [ 273.344443] ? kasan_check_read+0x11/0x20 [ 273.348592] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.353883] ? __lock_acquire+0x62f/0x4c20 [ 273.358129] ? find_held_lock+0x36/0x1c0 [ 273.362204] ? __lock_acquire+0x62f/0x4c20 [ 273.366446] ? __lock_acquire+0x62f/0x4c20 [ 273.370688] ? mark_held_locks+0x130/0x130 [ 273.374943] ? mark_held_locks+0x130/0x130 [ 273.379187] ? mark_held_locks+0x130/0x130 [ 273.383788] ? print_usage_bug+0xc0/0xc0 [ 273.387858] ? print_usage_bug+0xc0/0xc0 [ 273.391922] ? up_write+0x7b/0x220 [ 273.395478] __handle_mm_fault+0x3c91/0x5be0 [ 273.399901] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 273.404753] ? print_usage_bug+0xc0/0xc0 [ 273.408814] ? mark_held_locks+0x130/0x130 [ 273.413058] ? print_usage_bug+0xc0/0xc0 [ 273.417131] ? zap_class+0x640/0x640 [ 273.420860] ? zap_class+0x640/0x640 [ 273.424578] ? zap_class+0x640/0x640 [ 273.428302] ? find_held_lock+0x36/0x1c0 [ 273.432376] ? handle_mm_fault+0x42a/0xc70 [ 273.436619] ? lock_downgrade+0x900/0x900 [ 273.440774] ? check_preemption_disabled+0x48/0x280 [ 273.445799] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 273.450736] ? kasan_check_read+0x11/0x20 [ 273.454891] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 273.460180] ? rcu_softirq_qs+0x20/0x20 [ 273.464161] ? trace_hardirqs_off_caller+0x300/0x300 [ 273.469277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.474819] ? check_preemption_disabled+0x48/0x280 [ 273.479849] handle_mm_fault+0x54f/0xc70 [ 273.483916] ? __handle_mm_fault+0x5be0/0x5be0 [ 273.488505] ? find_vma+0x34/0x190 [ 273.492064] __do_page_fault+0x5d6/0xe40 [ 273.496145] do_page_fault+0xed/0x7d1 [ 273.499953] ? vmalloc_sync_all+0x30/0x30 [ 273.504110] ? error_entry+0x76/0xd0 [ 273.507833] ? trace_hardirqs_off_caller+0xbb/0x300 [ 273.513001] ? find_held_lock+0x36/0x1c0 [ 273.517075] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.521925] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.526959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.531820] page_fault+0x1e/0x30 [ 273.535277] RIP: 0010:__put_user_8+0x1c/0x25 [ 273.539692] Code: 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 07 48 39 d9 73 0c 0f 1f 00 <48> 89 01 31 c0 0f 1f 00 c3 b8 f2 ff ff ff 0f 1f 00 c3 90 90 55 48 [ 273.558593] RSP: 0018:ffff880187107a50 EFLAGS: 00010293 [ 273.563962] RAX: 0000000000000001 RBX: 00007fffffffeff9 RCX: 0000000020a16000 [ 273.571238] RDX: 00000000000000f4 RSI: ffffffff81b17393 RDI: 0000000000000286 [ 273.578508] RBP: ffff880187107b68 R08: 1ffff10030e20f27 R09: 0000000000000008 [ 273.585809] R10: 0000000000000001 R11: ffff88018b870340 R12: 0000000000000000 [ 273.593082] R13: 0000000000000001 R14: ffff8801c4c54d88 R15: ffff8801c4c54dd0 [ 273.600376] ? __might_fault+0x1a3/0x1e0 [ 273.604450] ? timerfd_read+0x856/0xc50 [ 273.608436] ? do_timerfd_settime+0x1000/0x1000 [ 273.613111] ? lock_downgrade+0x900/0x900 [ 273.617268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 273.622808] ? proc_fail_nth_write+0x9e/0x210 [ 273.627311] ? proc_cwd_link+0x1d0/0x1d0 [ 273.631378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.636918] ? fsnotify+0x4e5/0xf20 [ 273.640558] __vfs_read+0x117/0x9b0 [ 273.644197] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 273.649135] ? do_timerfd_settime+0x1000/0x1000 [ 273.653816] ? vfs_copy_file_range+0xb90/0xb90 [ 273.658408] ? fsnotify+0xf20/0xf20 [ 273.662064] ? security_file_permission+0x1c2/0x220 [ 273.667088] ? rw_verify_area+0x118/0x360 [ 273.671242] vfs_read+0x17f/0x3c0 [ 273.674706] ksys_read+0x101/0x260 [ 273.678252] ? kernel_write+0x120/0x120 [ 273.682245] ? trace_hardirqs_off_caller+0x300/0x300 [ 273.687360] __x64_sys_read+0x73/0xb0 [ 273.691166] do_syscall_64+0x1b9/0x820 [ 273.695070] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.700438] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.705370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.710219] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.715239] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.720269] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.725314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.730177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.735369] RIP: 0033:0x457569 [ 273.738571] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.757478] RSP: 002b:00007f85e4e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 273.765196] RAX: ffffffffffffffda RBX: 00007f85e4e26c90 RCX: 0000000000457569 [ 273.772469] RDX: 0000000000000047 RSI: 0000000020a16000 RDI: 0000000000000003 [ 273.779743] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 273.787014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f85e4e276d4 [ 273.794289] R13: 00000000004c2850 R14: 00000000004d5150 R15: 0000000000000004 03:13:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) connect$pppoe(r1, &(0x7f0000000280)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x6f83483001f0173}, 'bridge_slave_1\x00'}}, 0x1e) utimensat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{0x77359400}, {r2}}, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000300)={0x7}, 0x7) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x269, 0xfa00, {&(0x7f00000000c0)}}, 0x2) setsockopt$llc_int(r1, 0x10c, 0x2, &(0x7f0000000240), 0x4) 03:13:07 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x100000000000000, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x42, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x60, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 5 (fault-call:2 fault-nth:3): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:07 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x19, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 273.994407] misc userio: No port type given on /dev/userio 03:13:07 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x8, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x14, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x2c) 03:13:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000040)={0x0, 0x2ba1, 0x0, 0x4, {0x2, 0x3c, 0x4, 0x100000001}}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") unshare(0x400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname(r2, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000100)=0x80) 03:13:07 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x16, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd01000000000000, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x181) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000680)={0x0, 0x5}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000800)={r1, 0xbe, "af0d24a0077e1ef0341a5d1383b979f9be841a7413851df5774313132aec55ab12fe8beca6a79208333be6ea363dd3bf3ddf0049a3524a00e848298571af4426f7a4a7ee660e2955c23936059685b1dc1e526c9d668035fe9d2964be91cf6d4311d5e6e978ad8a15089934d5ab9092c449b5c7b6d76e178c61638d0674a0c963cbdf8208251ad91708bc3c67c0766f701e016aa7465b8f27eba75fce562fa079a04e4b1df3f734d53c9d1bccca0fdb47708ae70ee5a1799110914df66e6c"}, &(0x7f0000000900)=0xc6) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x80300) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000280)={"b61d3bbe52d75028290785806c026a89b9b1f382d910b3a4aa7b7a3be01627489bc78960dc4a8d8006367a195b9537b7da7acbd83e0c7d61ff9ee151c07b4a894822001e51c79ea8d975f519bd4c83773fab6d212d3bc009fdbe498bc54a964bc215400866865357fa8e35ef56474dc150404bf29ed0456914aa67901bf3d7bb3ba29e324fca8bd4a0b1b2bd278ea3a0576d82c8ae7d8e1fa5e723eee2bb10337bbd3c66f17e7948f81d8da2527dde4a2cd834303701ba103fd94a0c993fa9b5aa87cac21aa20bbe3c531f3c9e8669beca073b815e7c537fa9be19d59d746dda736ce163d030baae4f0950b5b23c7075cf9d19230bc6bf00eb1f130720d75a0f79ba1dd1d46a35bb539fc1d8a9393157a475375c53ed18909358365b478f1fbbea0a1ca9f467747ffb219a8c84c16bc5eb0f2799ef3bb223983ae829346b4f97dd22a040076fcd796b6c96b69b772fc9647ccfb451421195eab4dcec01a0ae5cf1eeb88cbf60a9a58a252997574fa4d3fa15bd5730bcb6b3dcbd030a02b62adf0c5f9b866d768f638248db923b0360cb0ebee0377228f71abe62f9c8b381f7d43be979417a721d041799eaddcaf7f92ffc2b207469251cab19ede5712a340c7c809ae5071851eae8307e464c4c9f04a6be73b0131401cbead4c9772e1bff9a75610e5ef0f22ea700bdac176d1d303bc4fc45f1a80cf38dd8cc2040c0fdec25243ab41e2d5b4371e25c4374926e7ef808821f05ff339ceca62ad91e010389279989f4146fe45ed09b80d32bce8176eeb5b00ef3c7cc5594f59d0dc9e48a4744f6d380ffb7dd8a7f662c1487e78c6941dd35a8d17c29d2c6905a770da057b33ee6e7a03a228ba26b3b9d703548ee6b2a680ee570919d73055421056009ad7f97409b83769aa2be3cbde957d65ea0396d045ad838d993ead88f01649a9c0e868ca9ee0fdd32fe11d1d18fb37bb61537f83680a80aa67c3a7b1bc26025b0286042bc453c3487fabc7d173a4edc3cb978f55cbdcc8d84d85dbaff93970e623f235b40485ca6ffdea0d56c9b87879fbcbea0f1e3e3d70d6d804d4de7e09bfa292d63b68139abe327863c86f559c3933ddc3651fd6fe5552e1654b1bca74f0dd11734a38f4de120a13f5a28fa4a16bc886c47f2a1c47572ec37de795a9aa8c943ee5162219171c3f78603e3ffeec37c20fbbd1394eda40b7e9d8a6b863f1ba8bfe778bb98527aa6e65f8d192f1b50b6d9890ae25c1ffc8e0fa432fe93d4cc7cd80d2715722a8e65f811f20176bc92e5cb1845824fc21c65d654e2d5f7d2810bcaefd14b26fb183f48606343fc981b35133d50f125bdc32f7510a7bb866b9f7d57c393ea253834ca0726e00640ebf77cffcd343dd203946443b16f59d43e59dff2e35701bc5852fafa68c03d486e2a4a65a0ef69fe29931828d5ba94ce954f3b21b493db"}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000780)=@assoc_value={0x0, 0x4}, &(0x7f00000007c0)=0x8) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000180)=0x6, 0x4) r3 = semget(0x1, 0x7, 0x0) semtimedop(r3, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f00000006c0)) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) [ 274.221914] Unknown ioctl -1069525442 [ 274.241971] Unknown ioctl -1069525442 03:13:07 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x20a16047) 03:13:07 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x3, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x1000000, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:07 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x3, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x5, 0x4001) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000580)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f00000006c0)={r4, &(0x7f00000005c0)=""/215}) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r5 = syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x900) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000000500)={0x0, 0x8f}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r9, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r6, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r6, 0x89f0, &(0x7f0000000040)={"626f6e6430000000030000000700", @ifru_hwaddr=@link_local}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r10, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r6, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@unspec, 0xc) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r8, 0x107, 0x2, &(0x7f00000002c0)={r7, 0x1, 0x6, @link_local}, 0x10) r12 = accept$inet(r11, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(0xffffffffffffffff, 0x406, r12) 03:13:08 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x14, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0xd010000, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x7) 03:13:08 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 274.596029] device lo entered promiscuous mode 03:13:08 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x15, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x30, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 5: r0 = timerfd_create(0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000240)=0x78) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@delsa={0x3c, 0x11, 0x4, 0x70bd27, 0x25dfdbfe, {@in6=@mcast1, 0x4d2, 0xa, 0x7e}, [@mark={0xc, 0x15, {0x35075d, 0xe3438ae40000000}}, @etimer_thresh={0x8, 0xc, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:08 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x42, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x2, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x181) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000680)={0x0, 0x5}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000800)={r1, 0xbe, "af0d24a0077e1ef0341a5d1383b979f9be841a7413851df5774313132aec55ab12fe8beca6a79208333be6ea363dd3bf3ddf0049a3524a00e848298571af4426f7a4a7ee660e2955c23936059685b1dc1e526c9d668035fe9d2964be91cf6d4311d5e6e978ad8a15089934d5ab9092c449b5c7b6d76e178c61638d0674a0c963cbdf8208251ad91708bc3c67c0766f701e016aa7465b8f27eba75fce562fa079a04e4b1df3f734d53c9d1bccca0fdb47708ae70ee5a1799110914df66e6c"}, &(0x7f0000000900)=0xc6) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x80300) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000280)={"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"}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000780)=@assoc_value={0x0, 0x4}, &(0x7f00000007c0)=0x8) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000180)=0x6, 0x4) r3 = semget(0x1, 0x7, 0x0) semtimedop(r3, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}]) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f00000006c0)) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) [ 274.954239] device lo left promiscuous mode 03:13:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x5, 0x4001) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000580)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f00000006c0)={r4, &(0x7f00000005c0)=""/215}) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r5 = syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x900) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000000500)={0x0, 0x8f}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r9, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r6, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r6, 0x89f0, &(0x7f0000000040)={"626f6e6430000000030000000700", @ifru_hwaddr=@link_local}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r10, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r6, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@unspec, 0xc) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r8, 0x107, 0x2, &(0x7f00000002c0)={r7, 0x1, 0x6, @link_local}, 0x10) r12 = accept$inet(r11, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(0xffffffffffffffff, 0x406, r12) 03:13:08 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x7, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x7, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x17, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x19, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 275.206609] device lo entered promiscuous mode 03:13:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x30, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x32, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590d0100"}, &(0x7f0000000040)=0x1e) 03:13:08 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x80) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000080)) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x5, 0x4001) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000580)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f00000006c0)={r4, &(0x7f00000005c0)=""/215}) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r5 = syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x900) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000000500)={0x0, 0x8f}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r9, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r6, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r6, 0x89f0, &(0x7f0000000040)={"626f6e6430000000030000000700", @ifru_hwaddr=@link_local}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r10, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r6, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@unspec, 0xc) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r8, 0x107, 0x2, &(0x7f00000002c0)={r7, 0x1, 0x6, @link_local}, 0x10) r12 = accept$inet(r11, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(0xffffffffffffffff, 0x406, r12) 03:13:09 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x2, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 275.381659] device lo left promiscuous mode 03:13:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x6, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 275.452446] device lo entered promiscuous mode 03:13:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x5, 0x4001) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000580)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f00000006c0)={r4, &(0x7f00000005c0)=""/215}) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r5 = syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x900) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000000500)={0x0, 0x8f}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={r9, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r6, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r6, 0x89f0, &(0x7f0000000040)={"626f6e6430000000030000000700", @ifru_hwaddr=@link_local}) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r10, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r6, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@unspec, 0xc) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r8, 0x107, 0x2, &(0x7f00000002c0)={r7, 0x1, 0x6, @link_local}, 0x10) r12 = accept$inet(r11, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(0xffffffffffffffff, 0x406, r12) 03:13:09 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffc1, 0x400) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x1ff, 0x2009}) setns(r1, 0x8000000) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:09 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xc, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000100"}, &(0x7f0000000040)=0x1e) [ 275.652735] device lo entered promiscuous mode 03:13:09 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) openat(r1, &(0x7f0000000140)='./file0\x00', 0x210000, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0xa6, 0x1ff, 0x0, 0x8, 0xffffffff, 0xc98d, 0x3f, 0xff1, r2}, &(0x7f0000000100)=0x20) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x16, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xe, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 275.779581] device lo left promiscuous mode 03:13:09 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xd, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {}, 0xfffffffffffffffe, 0x2}, 0xe) fsync(r0) 03:13:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x8, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x4e21, @multicast1}}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r2 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 275.945112] device lo left promiscuous mode 03:13:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000080)="6664696e666f2a11606aa7819b2cd6c72d07d1") preadv(r2, &(0x7f0000000480), 0x100000000000021c, 0x0) 03:13:09 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000100"}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000015, 0x805, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'ip6tnl0\x00', 0xfffffffffffffffc}) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000040)={@empty, @multicast2}, &(0x7f0000000080)=0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) 03:13:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x4, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 5: r0 = timerfd_create(0xffffffffffffffff, 0x800) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:09 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x14, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) timerfd_create(0x7, 0x80000) fchmod(r0, 0x3d6bb105531cfb75) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r1, &(0x7f0000a16000)=""/71, 0x47) [ 276.183726] device ip6tnl0 entered promiscuous mode 03:13:09 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000010d00"}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000280)={[{0x0, 0x5, 0x8, 0x1f, 0x5, 0x8, 0x4, 0x1ff, 0x4, 0x3, 0xfff, 0x7f, 0x8000}, {0xeae, 0x0, 0xffff, 0x8, 0x8, 0xffffffffffff8000, 0xfff, 0x7fff, 0x3, 0xffff, 0x7, 0xeac, 0x1}, {0x5, 0x7, 0x6, 0x81, 0x8, 0xf6, 0x6, 0x1, 0x3, 0x294, 0x80, 0x0, 0x8}], 0x5}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000000c0)={'ifb0\x00', {0x2, 0x4e23, @local}}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000001c0)=""/41) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 03:13:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x21, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:09 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859010d00"}, &(0x7f0000000040)=0x1e) 03:13:10 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:13:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="000000008d000022"], 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) r4 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000080)=""/221) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x101ff, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r6 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x40000) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000380)) r7 = add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="f2bb2a496f17457aca4eecd3675335dfdddbb0fc1672591c3ef1e343f11021be43ac3a91948b62ab8a8e5b7c", 0x2c, 0x0) keyctl$describe(0x6, r7, &(0x7f0000000280)=""/20, 0x14) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {0x0, 0xfffffffffffffffc}, {}, {0xfffffffffffffffc}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000002b00)={0x3, 0x1, 0x7fff, 0x5, 0x2}) sendmsg$alg(r5, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000500)="fd8fd4d0a399ba6dbd8068dfa39cd5599150cac9f0288dff08a518f88a8eb2147e30bb55e451ee03aaa1e95b80f5bb230f0e8c1a66ebfb555eb7ca7fcf4d39bcc0fb67d1e0373a50d220318c469e9f39af04b8aedde68494f853cde2cf3d425b73", 0x61}, {&(0x7f0000000300)="b5d3d1c8", 0x4}, {&(0x7f0000000580)="4465a81fa93e1e2802492ebfe8fc783969e75a26f55077666e35dcd30658675a965ad1360cb9c7526b0d0cbf13d9521a059b81f087f33f761d4bcf85dfacb1ffa6941f4bd6ea4117bd66219532d01a45689bf8776e4a5527a8746f1b631b0e2f2600f0", 0x63}, {&(0x7f0000000600)="306961b00f845a434e3228ad2d82635b8f0f129973285265f19f470ab0ae173811660176e1734f47b176ed7ac010ba51b0dd3870bfa5978c2846c8c50cf8dbbbc401ba43f380aeb6ab3f18ecc83cdcd7af41ffe44e3c10b9829ed77da402c69a9b263299f76519f0ff4cfc5a0ce162caa116bf554cd632933176075ed096dd0f0bfb50190abcabff16472831ed8c0547d9597ae814eb1a19a92feb353bdaa9dba85b4a2e1a91639826b274194b929857c934309c7e046b798e3d821eae11fd646803c7d2c3e347a621ca2676dcda5c2793df5b274974808a48c33806052836e2836661c4ab9edc0e4c2a9ff5e03d3ecd1f16", 0xf2}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="3d36195bead94a39ef97fa3ce95d0789919120c0aa8fc455dd96caf534", 0x1d}, {&(0x7f0000001740)="71552149cb0842956a87a6bb73cc5e26fcdfe0ad872e85590313b582420ee92b24675faace3952ef2f82ce3aee5810871f35130d81bba5369d9eae6e756dca957c623fea3bb7b07f162a14c5a937921fb5cf607ae0a54f2cbab7496341f42202c209dd148cbba9001efa131fdbf8d0e31a389e62d11549e5d1131d7191049962337933584c1e547c35fa0eb215fcb01811de635671f7083eae4a93e49264c1e67213", 0xa2}, {&(0x7f0000001800)="10826cd499a937c5b4b942cd9870f25ddc479a994df1c13a6d7f20df178a6c8705432a1e4dbc808b68f330cd440f48f95bc72acefd0d2528eeb3cf4934ff9f02ba0057b69c1a34a34444a6c1ba20c831070f512673970fa10c84f721c3e31ceaf0e4c93c1a258eda9515a19f8775", 0x6e}, {&(0x7f0000001880)="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", 0x1000}], 0x9, &(0x7f0000002940)=[@iv={0x28, 0x117, 0x2, 0xe, "d3b42c843c0724fc732e38aa7c89"}, @iv={0x110, 0x117, 0x2, 0xfb, "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"}, @assoc={0x18, 0x117, 0x4, 0xf880}], 0x150, 0x80}, 0x40000) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:13:10 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x3, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:10 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x18, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:10 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x801, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000080)={0x9, 0x4, 0x9, 0x1, 0x10000}) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:10 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000200)=""/178, &(0x7f0000000040)=0xb2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000140)={0x40, "5609a2f7d796467e4b4788e2a4539306852b57ea8c200708766eae46e86c6713", 0x10, 0x0, 0x1ff800000000000, 0x2, 0x4}) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x3) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f00000000c0)={0x9, 0xf, 0x4, 0x2000000, {0x0, 0x7530}, {0x7, 0x3, 0x2, 0x8, 0x5, 0xe3, '7tE.'}, 0x7f, 0x4, @userptr=0x7, 0x4}) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 03:13:10 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x9, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:10 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:10 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xd, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:10 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x400000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000040)=0x68) 03:13:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000280)='\x00', 0x4) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000300)={0xffffffffffffffff}, 0x2, {0xa, 0x4e20, 0x8000, @dev={0xfe, 0x80, [], 0x16}, 0x100000000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f0000000380)={0x11, 0x10, 0xfa00, {&(0x7f00000002c0), r4}}, 0x18) r5 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x2000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000400)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e23, 0xc433, @mcast1, 0x8}], 0x3c) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f0000000100)={0x81, 0x4, 0x6, 0x3ff, 0x0, 0x6}) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000180)=ANY=[@ANYBLOB="294f5b15f9a573f0330a9dd995a16a14aa52da70b8d33fcff18d9492b44001bded321cf0c7a6dec7f5853851e0e6e98b61484ad6"]) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x2, 0x0) ioctl$KVM_GET_XSAVE(r6, 0x9000aea4, &(0x7f00000004c0)) accept4$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000240)=0x1c, 0x80800) ioctl$KDGETLED(r6, 0x4b31, &(0x7f00000003c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000008c0)={0x15, 0x110, 0xfa00, {r7, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @local}}}, 0x118) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b}) 03:13:11 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x30, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="000000008d000022"], 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) r4 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000080)=""/221) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x101ff, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r6 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x40000) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000380)) r7 = add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="f2bb2a496f17457aca4eecd3675335dfdddbb0fc1672591c3ef1e343f11021be43ac3a91948b62ab8a8e5b7c", 0x2c, 0x0) keyctl$describe(0x6, r7, &(0x7f0000000280)=""/20, 0x14) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {0x0, 0xfffffffffffffffc}, {}, {0xfffffffffffffffc}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000002b00)={0x3, 0x1, 0x7fff, 0x5, 0x2}) sendmsg$alg(r5, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000500)="fd8fd4d0a399ba6dbd8068dfa39cd5599150cac9f0288dff08a518f88a8eb2147e30bb55e451ee03aaa1e95b80f5bb230f0e8c1a66ebfb555eb7ca7fcf4d39bcc0fb67d1e0373a50d220318c469e9f39af04b8aedde68494f853cde2cf3d425b73", 0x61}, {&(0x7f0000000300)="b5d3d1c8", 0x4}, {&(0x7f0000000580)="4465a81fa93e1e2802492ebfe8fc783969e75a26f55077666e35dcd30658675a965ad1360cb9c7526b0d0cbf13d9521a059b81f087f33f761d4bcf85dfacb1ffa6941f4bd6ea4117bd66219532d01a45689bf8776e4a5527a8746f1b631b0e2f2600f0", 0x63}, {&(0x7f0000000600)="306961b00f845a434e3228ad2d82635b8f0f129973285265f19f470ab0ae173811660176e1734f47b176ed7ac010ba51b0dd3870bfa5978c2846c8c50cf8dbbbc401ba43f380aeb6ab3f18ecc83cdcd7af41ffe44e3c10b9829ed77da402c69a9b263299f76519f0ff4cfc5a0ce162caa116bf554cd632933176075ed096dd0f0bfb50190abcabff16472831ed8c0547d9597ae814eb1a19a92feb353bdaa9dba85b4a2e1a91639826b274194b929857c934309c7e046b798e3d821eae11fd646803c7d2c3e347a621ca2676dcda5c2793df5b274974808a48c33806052836e2836661c4ab9edc0e4c2a9ff5e03d3ecd1f16", 0xf2}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="3d36195bead94a39ef97fa3ce95d0789919120c0aa8fc455dd96caf534", 0x1d}, {&(0x7f0000001740)="71552149cb0842956a87a6bb73cc5e26fcdfe0ad872e85590313b582420ee92b24675faace3952ef2f82ce3aee5810871f35130d81bba5369d9eae6e756dca957c623fea3bb7b07f162a14c5a937921fb5cf607ae0a54f2cbab7496341f42202c209dd148cbba9001efa131fdbf8d0e31a389e62d11549e5d1131d7191049962337933584c1e547c35fa0eb215fcb01811de635671f7083eae4a93e49264c1e67213", 0xa2}, {&(0x7f0000001800)="10826cd499a937c5b4b942cd9870f25ddc479a994df1c13a6d7f20df178a6c8705432a1e4dbc808b68f330cd440f48f95bc72acefd0d2528eeb3cf4934ff9f02ba0057b69c1a34a34444a6c1ba20c831070f512673970fa10c84f721c3e31ceaf0e4c93c1a258eda9515a19f8775", 0x6e}, {&(0x7f0000001880)="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", 0x1000}], 0x9, &(0x7f0000002940)=[@iv={0x28, 0x117, 0x2, 0xe, "d3b42c843c0724fc732e38aa7c89"}, @iv={0x110, 0x117, 0x2, 0xfb, "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"}, @assoc={0x18, 0x117, 0x4, 0xf880}], 0x150, 0x80}, 0x40000) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:13:11 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x13, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:11 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000100"}, &(0x7f0000000040)=0x1e) 03:13:11 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000000040)=""/71, 0x47) 03:13:11 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x31, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:11 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', '*\x00'}, 0x1a, 0x0) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0x1c, 0x800) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'teql0\x00', 0x9}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 278.173419] encrypted_key: keylen parameter is missing 03:13:11 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:11 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x4, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:11 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:11 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000480)={0x7, 0x0, [{0xd000, 0x57, &(0x7f0000000080)=""/87}, {0x4, 0x69, &(0x7f0000000100)=""/105}, {0xd000, 0x85, &(0x7f0000000180)=""/133}, {0x1, 0x53, &(0x7f0000000240)=""/83}, {0x101000, 0x12, &(0x7f00000002c0)=""/18}, {0x2002, 0xe9, &(0x7f0000000300)=""/233}, {0x3000, 0x4c, &(0x7f0000000400)=""/76}]}) 03:13:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="000000008d000022"], 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) r4 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000080)=""/221) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x101ff, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r6 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x40000) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000380)) r7 = add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="f2bb2a496f17457aca4eecd3675335dfdddbb0fc1672591c3ef1e343f11021be43ac3a91948b62ab8a8e5b7c", 0x2c, 0x0) keyctl$describe(0x6, r7, &(0x7f0000000280)=""/20, 0x14) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {0x0, 0xfffffffffffffffc}, {}, {0xfffffffffffffffc}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000002b00)={0x3, 0x1, 0x7fff, 0x5, 0x2}) sendmsg$alg(r5, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000500)="fd8fd4d0a399ba6dbd8068dfa39cd5599150cac9f0288dff08a518f88a8eb2147e30bb55e451ee03aaa1e95b80f5bb230f0e8c1a66ebfb555eb7ca7fcf4d39bcc0fb67d1e0373a50d220318c469e9f39af04b8aedde68494f853cde2cf3d425b73", 0x61}, {&(0x7f0000000300)="b5d3d1c8", 0x4}, {&(0x7f0000000580)="4465a81fa93e1e2802492ebfe8fc783969e75a26f55077666e35dcd30658675a965ad1360cb9c7526b0d0cbf13d9521a059b81f087f33f761d4bcf85dfacb1ffa6941f4bd6ea4117bd66219532d01a45689bf8776e4a5527a8746f1b631b0e2f2600f0", 0x63}, {&(0x7f0000000600)="306961b00f845a434e3228ad2d82635b8f0f129973285265f19f470ab0ae173811660176e1734f47b176ed7ac010ba51b0dd3870bfa5978c2846c8c50cf8dbbbc401ba43f380aeb6ab3f18ecc83cdcd7af41ffe44e3c10b9829ed77da402c69a9b263299f76519f0ff4cfc5a0ce162caa116bf554cd632933176075ed096dd0f0bfb50190abcabff16472831ed8c0547d9597ae814eb1a19a92feb353bdaa9dba85b4a2e1a91639826b274194b929857c934309c7e046b798e3d821eae11fd646803c7d2c3e347a621ca2676dcda5c2793df5b274974808a48c33806052836e2836661c4ab9edc0e4c2a9ff5e03d3ecd1f16", 0xf2}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="3d36195bead94a39ef97fa3ce95d0789919120c0aa8fc455dd96caf534", 0x1d}, {&(0x7f0000001740)="71552149cb0842956a87a6bb73cc5e26fcdfe0ad872e85590313b582420ee92b24675faace3952ef2f82ce3aee5810871f35130d81bba5369d9eae6e756dca957c623fea3bb7b07f162a14c5a937921fb5cf607ae0a54f2cbab7496341f42202c209dd148cbba9001efa131fdbf8d0e31a389e62d11549e5d1131d7191049962337933584c1e547c35fa0eb215fcb01811de635671f7083eae4a93e49264c1e67213", 0xa2}, {&(0x7f0000001800)="10826cd499a937c5b4b942cd9870f25ddc479a994df1c13a6d7f20df178a6c8705432a1e4dbc808b68f330cd440f48f95bc72acefd0d2528eeb3cf4934ff9f02ba0057b69c1a34a34444a6c1ba20c831070f512673970fa10c84f721c3e31ceaf0e4c93c1a258eda9515a19f8775", 0x6e}, {&(0x7f0000001880)="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", 0x1000}], 0x9, &(0x7f0000002940)=[@iv={0x28, 0x117, 0x2, 0xe, "d3b42c843c0724fc732e38aa7c89"}, @iv={0x110, 0x117, 0x2, 0xfb, "f760b5d00cb35988b5518c5f5a0c22c9233a92bd3506f365879f4516176a89d20f8c554c56a37d37c92c9a5a642c05b02c78e8bea7f20da62ce06d3bd2f9e4adf18e5bc6360595a6df80e27c4e5e4df7ba18d8f3421339bb38836637b55b1cb602ed90870faf40cd8234de7e1ac4d72eddcaa56e3df84b24133bf56c480574c7b15ecae384f9b33b2e001b853e38143e6b2f29c3a0e29077145fe7c14f04b7b99a1767bb486e45572de28ebb39f764fbbbdcf926d55fc54a0fd403f108e3fb6d9590d68615b6da9372d37db1724de7ca36849d9a5eb5aa4902495ff4bd6a625ebe6945c6dc6853ad31606593fcb381eef97beaa216041b6a6b1bdc"}, @assoc={0x18, 0x117, 0x4, 0xf880}], 0x150, 0x80}, 0x40000) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:13:11 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x7, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="000000008d000022"], 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) r4 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000080)=""/221) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x101ff, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r6 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x40000) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000380)) r7 = add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="f2bb2a496f17457aca4eecd3675335dfdddbb0fc1672591c3ef1e343f11021be43ac3a91948b62ab8a8e5b7c", 0x2c, 0x0) keyctl$describe(0x6, r7, &(0x7f0000000280)=""/20, 0x14) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {0x0, 0xfffffffffffffffc}, {}, {0xfffffffffffffffc}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000002b00)={0x3, 0x1, 0x7fff, 0x5, 0x2}) sendmsg$alg(r5, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000500)="fd8fd4d0a399ba6dbd8068dfa39cd5599150cac9f0288dff08a518f88a8eb2147e30bb55e451ee03aaa1e95b80f5bb230f0e8c1a66ebfb555eb7ca7fcf4d39bcc0fb67d1e0373a50d220318c469e9f39af04b8aedde68494f853cde2cf3d425b73", 0x61}, {&(0x7f0000000300)="b5d3d1c8", 0x4}, {&(0x7f0000000580)="4465a81fa93e1e2802492ebfe8fc783969e75a26f55077666e35dcd30658675a965ad1360cb9c7526b0d0cbf13d9521a059b81f087f33f761d4bcf85dfacb1ffa6941f4bd6ea4117bd66219532d01a45689bf8776e4a5527a8746f1b631b0e2f2600f0", 0x63}, {&(0x7f0000000600)="306961b00f845a434e3228ad2d82635b8f0f129973285265f19f470ab0ae173811660176e1734f47b176ed7ac010ba51b0dd3870bfa5978c2846c8c50cf8dbbbc401ba43f380aeb6ab3f18ecc83cdcd7af41ffe44e3c10b9829ed77da402c69a9b263299f76519f0ff4cfc5a0ce162caa116bf554cd632933176075ed096dd0f0bfb50190abcabff16472831ed8c0547d9597ae814eb1a19a92feb353bdaa9dba85b4a2e1a91639826b274194b929857c934309c7e046b798e3d821eae11fd646803c7d2c3e347a621ca2676dcda5c2793df5b274974808a48c33806052836e2836661c4ab9edc0e4c2a9ff5e03d3ecd1f16", 0xf2}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="3d36195bead94a39ef97fa3ce95d0789919120c0aa8fc455dd96caf534", 0x1d}, {&(0x7f0000001740)="71552149cb0842956a87a6bb73cc5e26fcdfe0ad872e85590313b582420ee92b24675faace3952ef2f82ce3aee5810871f35130d81bba5369d9eae6e756dca957c623fea3bb7b07f162a14c5a937921fb5cf607ae0a54f2cbab7496341f42202c209dd148cbba9001efa131fdbf8d0e31a389e62d11549e5d1131d7191049962337933584c1e547c35fa0eb215fcb01811de635671f7083eae4a93e49264c1e67213", 0xa2}, {&(0x7f0000001800)="10826cd499a937c5b4b942cd9870f25ddc479a994df1c13a6d7f20df178a6c8705432a1e4dbc808b68f330cd440f48f95bc72acefd0d2528eeb3cf4934ff9f02ba0057b69c1a34a34444a6c1ba20c831070f512673970fa10c84f721c3e31ceaf0e4c93c1a258eda9515a19f8775", 0x6e}, {&(0x7f0000001880)="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", 0x1000}], 0x9, &(0x7f0000002940)=[@iv={0x28, 0x117, 0x2, 0xe, "d3b42c843c0724fc732e38aa7c89"}, @iv={0x110, 0x117, 0x2, 0xfb, "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"}, @assoc={0x18, 0x117, 0x4, 0xf880}], 0x150, 0x80}, 0x40000) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:13:12 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x17, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900010d00"}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) dup2(r0, r0) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:12 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000d0100"}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x7, 0x100) getdents(r1, &(0x7f0000000140)=""/103, 0x67) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8001, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000080)={0x7, 0x0, {0x3, 0x1, 0x2, 0x1, 0x3288000000000}}) 03:13:12 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xc, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x6, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="000000008d000022"], 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) r4 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000080)=""/221) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x101ff, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r6 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x40000) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000380)) r7 = add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="f2bb2a496f17457aca4eecd3675335dfdddbb0fc1672591c3ef1e343f11021be43ac3a91948b62ab8a8e5b7c", 0x2c, 0x0) keyctl$describe(0x6, r7, &(0x7f0000000280)=""/20, 0x14) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {0x0, 0xfffffffffffffffc}, {}, {0xfffffffffffffffc}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000002b00)={0x3, 0x1, 0x7fff, 0x5, 0x2}) sendmsg$alg(r5, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000500)="fd8fd4d0a399ba6dbd8068dfa39cd5599150cac9f0288dff08a518f88a8eb2147e30bb55e451ee03aaa1e95b80f5bb230f0e8c1a66ebfb555eb7ca7fcf4d39bcc0fb67d1e0373a50d220318c469e9f39af04b8aedde68494f853cde2cf3d425b73", 0x61}, {&(0x7f0000000300)="b5d3d1c8", 0x4}, {&(0x7f0000000580)="4465a81fa93e1e2802492ebfe8fc783969e75a26f55077666e35dcd30658675a965ad1360cb9c7526b0d0cbf13d9521a059b81f087f33f761d4bcf85dfacb1ffa6941f4bd6ea4117bd66219532d01a45689bf8776e4a5527a8746f1b631b0e2f2600f0", 0x63}, {&(0x7f0000000600)="306961b00f845a434e3228ad2d82635b8f0f129973285265f19f470ab0ae173811660176e1734f47b176ed7ac010ba51b0dd3870bfa5978c2846c8c50cf8dbbbc401ba43f380aeb6ab3f18ecc83cdcd7af41ffe44e3c10b9829ed77da402c69a9b263299f76519f0ff4cfc5a0ce162caa116bf554cd632933176075ed096dd0f0bfb50190abcabff16472831ed8c0547d9597ae814eb1a19a92feb353bdaa9dba85b4a2e1a91639826b274194b929857c934309c7e046b798e3d821eae11fd646803c7d2c3e347a621ca2676dcda5c2793df5b274974808a48c33806052836e2836661c4ab9edc0e4c2a9ff5e03d3ecd1f16", 0xf2}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="3d36195bead94a39ef97fa3ce95d0789919120c0aa8fc455dd96caf534", 0x1d}, {&(0x7f0000001740)="71552149cb0842956a87a6bb73cc5e26fcdfe0ad872e85590313b582420ee92b24675faace3952ef2f82ce3aee5810871f35130d81bba5369d9eae6e756dca957c623fea3bb7b07f162a14c5a937921fb5cf607ae0a54f2cbab7496341f42202c209dd148cbba9001efa131fdbf8d0e31a389e62d11549e5d1131d7191049962337933584c1e547c35fa0eb215fcb01811de635671f7083eae4a93e49264c1e67213", 0xa2}, {&(0x7f0000001800)="10826cd499a937c5b4b942cd9870f25ddc479a994df1c13a6d7f20df178a6c8705432a1e4dbc808b68f330cd440f48f95bc72acefd0d2528eeb3cf4934ff9f02ba0057b69c1a34a34444a6c1ba20c831070f512673970fa10c84f721c3e31ceaf0e4c93c1a258eda9515a19f8775", 0x6e}, {&(0x7f0000001880)="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", 0x1000}], 0x9, &(0x7f0000002940)=[@iv={0x28, 0x117, 0x2, 0xe, "d3b42c843c0724fc732e38aa7c89"}, @iv={0x110, 0x117, 0x2, 0xfb, "f760b5d00cb35988b5518c5f5a0c22c9233a92bd3506f365879f4516176a89d20f8c554c56a37d37c92c9a5a642c05b02c78e8bea7f20da62ce06d3bd2f9e4adf18e5bc6360595a6df80e27c4e5e4df7ba18d8f3421339bb38836637b55b1cb602ed90870faf40cd8234de7e1ac4d72eddcaa56e3df84b24133bf56c480574c7b15ecae384f9b33b2e001b853e38143e6b2f29c3a0e29077145fe7c14f04b7b99a1767bb486e45572de28ebb39f764fbbbdcf926d55fc54a0fd403f108e3fb6d9590d68615b6da9372d37db1724de7ca36849d9a5eb5aa4902495ff4bd6a625ebe6945c6dc6853ad31606593fcb381eef97beaa216041b6a6b1bdc"}, @assoc={0x18, 0x117, 0x4, 0xf880}], 0x150, 0x80}, 0x40000) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:13:12 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() getgroups(0x0, &(0x7f0000000380)) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB]) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000500)={0x10000009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00'}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000240)=0x1) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000001c0)) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0xa3c29fff, 0x811, r2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b40)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(r0, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0xffffffffffffffb6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r3}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@multicast2, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a00)=0xfffffffffffffce1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000020c0)={@multicast1, @remote}, &(0x7f0000002100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000017c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002500)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) syslog(0xa, &(0x7f0000003680)=""/4096, 0x1000) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000380)={0x0, 0x3000, 0x507, 0x6}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 03:13:13 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xa, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 5: r0 = timerfd_create(0x0, 0x0) socketpair(0x5, 0xd9930563fc53e64e, 0x80000000, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x6, 0x3}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in={{0x2, 0x4e24}}}, &(0x7f00000001c0)=0x84) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:13 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000010d00"}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xb, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x32, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) dup3(r0, r0, 0x80000) read(r0, &(0x7f0000a16000)=""/71, 0x47) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x1, 0x1, 0xfffffffffffffffe, 0xd4, r1}) 03:13:13 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590d0100"}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000d0100"}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x18, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:13 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x2f) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000002c0)=""/197) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00, {0x600, 0x0, 0xfeffffff}}, 0xfffffefd) dup2(r1, r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x100000001, {{0x2, 0x0, @loopback}}}, 0x88) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0xa8d) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000180)="b86c5a5765d8909a41058e7ed948da651e7d35442e733756ed49c8e2a4d6c32e996e469e71561421a983754bcdb5de82a103cad8fd3beba55628daa7c74297a253b7fb782a85d894f1fd3830975d57894b64ffe7c9f4562ab06bb3173a35e77d017aa34fd3e4eeaa88eb1e19940db045deef604dc3ab", &(0x7f00000003c0)=""/191}, 0x18) 03:13:13 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x2f) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000002c0)=""/197) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00, {0x600, 0x0, 0xfeffffff}}, 0xfffffefd) dup2(r1, r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x100000001, {{0x2, 0x0, @loopback}}}, 0x88) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0xa8d) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000180)="b86c5a5765d8909a41058e7ed948da651e7d35442e733756ed49c8e2a4d6c32e996e469e71561421a983754bcdb5de82a103cad8fd3beba55628daa7c74297a253b7fb782a85d894f1fd3830975d57894b64ffe7c9f4562ab06bb3173a35e77d017aa34fd3e4eeaa88eb1e19940db045deef604dc3ab", &(0x7f00000003c0)=""/191}, 0x18) 03:13:14 executing program 5: r0 = timerfd_create(0x3, 0xfffffffffffffffe) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) 03:13:14 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x9, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x2f) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000002c0)=""/197) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00, {0x600, 0x0, 0xfeffffff}}, 0xfffffefd) dup2(r1, r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x100000001, {{0x2, 0x0, @loopback}}}, 0x88) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0xa8d) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000180)="b86c5a5765d8909a41058e7ed948da651e7d35442e733756ed49c8e2a4d6c32e996e469e71561421a983754bcdb5de82a103cad8fd3beba55628daa7c74297a253b7fb782a85d894f1fd3830975d57894b64ffe7c9f4562ab06bb3173a35e77d017aa34fd3e4eeaa88eb1e19940db045deef604dc3ab", &(0x7f00000003c0)=""/191}, 0x18) 03:13:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001d08000000000000000200006b1173a9759b3784e1c15d7202080003009900000000000003c784018c6608f71e310c"], 0x1c}}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x14000000, 0x8001, 0x1}) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r2, &(0x7f0000a16000)=""/71, 0x47) 03:13:14 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000100"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xe, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000100"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x2f) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstatfs(0xffffffffffffffff, &(0x7f00000002c0)=""/197) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00, {0x600, 0x0, 0xfeffffff}}, 0xfffffefd) dup2(r1, r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x100000001, {{0x2, 0x0, @loopback}}}, 0x88) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0xa8d) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f0000000180)="b86c5a5765d8909a41058e7ed948da651e7d35442e733756ed49c8e2a4d6c32e996e469e71561421a983754bcdb5de82a103cad8fd3beba55628daa7c74297a253b7fb782a85d894f1fd3830975d57894b64ffe7c9f4562ab06bb3173a35e77d017aa34fd3e4eeaa88eb1e19940db045deef604dc3ab", &(0x7f00000003c0)=""/191}, 0x18) 03:13:14 executing program 5: r0 = timerfd_create(0x1, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xb, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x100000001, 0x0, "49ccc28e9097d51ac1a09c3922e6d9685575bb63f4a3dc4949701a290d947bdff16649cb7e88a0f98bd3bd74fc106e73228f238f97135b90032f52247dbaf566741195a8978b8a51cc90866aef35bc2c"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @dev}}, 0x0, 0x6, 0x0, "b6f73b6e690dfa12c023fe736a343f8b70bbfadd0b2b7917794acb5f197a68d966aa0b5a5f41ca2b6204d8bac209c26d4b213ba809a1c6e983a2b18c3657b1710a93895ee1e98fb8566092d73d71d352"}, 0xd8) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0x3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x1, 0x401}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x1}, &(0x7f0000000300)=0x8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000014c0)={@in={{0x2, 0x0, @dev}}, 0x0, 0x0, 0x0, "4ae9645a4bdbefd0187f1e35cba955127c7ca8b982f7408054208a36ee7b341bc01b6d8d52e8ee57c61ec7f041e965466b7a2d4cec6a16d568c9683cac6791e3bef5d31b03d40e4f5f68137e44379c3b"}, 0xd8) 03:13:14 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:14 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40080, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0x5, 0x5, 0x501, 0x89, 0x2}, 0x14) futex(0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x0) timer_create(0x7, &(0x7f0000000100)={0x0, 0x32, 0x6, @thr={&(0x7f0000000080)="b9d3a7a96ac4436528389f37f28d8efbd6eb9d5db3", &(0x7f00000000c0)="fe15b7b01cb005c3ec9d0a6664c4a02ff9975dc0d8a1a3f12b8c3968e2ecc33b0c99211ca54f56cbac"}}, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(r1, 0x0, &(0x7f00000001c0)={{r2, r3+30000000}, {0x77359400}}, &(0x7f0000000200)) poll(&(0x7f0000000040)=[{r0, 0x23dc}, {r0, 0x200}], 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [], @local}, 0x3}}, 0x800, 0x9, 0x8e, 0x4, 0xffffffff00000001}, &(0x7f0000000300)=0x98) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000380)=0x3) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000340)={r4, 0x8000000000000}, 0x8) 03:13:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x80000) 03:13:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000100"}, &(0x7f0000000040)=0x1e) [ 281.594885] QAT: Invalid ioctl [ 281.627200] QAT: Invalid ioctl 03:13:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x22, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000100"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f00000000c0), 0x80800) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setsig(r0, 0xa, 0x34) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000080)={0x0, 0xfff, 0x100, 0x6, {0x1, 0x7fffffff, 0x3e438fd6, 0x81}}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x1, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000140)="2685797c28e79e6fc2") ioctl$NBD_SET_SOCK(r1, 0xab00, r1) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x4}, 0x8) fcntl$addseals(r2, 0x409, 0x1) acct(&(0x7f0000000180)='./file0\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x9, 0x600000000}, &(0x7f0000000240)=0x8) r5 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000400)=0x1) r6 = request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='wlan0em1\\[ppp1selinuxem0\x00', 0xfffffffffffffff8) keyctl$unlink(0x9, r5, r6) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={r4, 0x3, 0x5}, 0x8) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:15 executing program 2: r0 = socket(0x10000000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="240000002e002302045200e7000000000000f9fffffffffffbffff000000002000400061", 0x24) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x140, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$inet_sctp(0x2, 0x4, 0x84) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000240)=0x4, &(0x7f0000000280)=0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x100000000, 0x1a3}, &(0x7f00000000c0)=0xc) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r5, 0xc0045520, &(0x7f0000000300)=0x7) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r6, 0x2201, &(0x7f00000001c0)=0xff) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f00000003c0)={r7, 0x80000, r6}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x5}, &(0x7f0000000140)=0x8) r9 = fcntl$dupfd(r3, 0x100000, r2) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r6, 0x84, 0x78, &(0x7f0000000200)=r8, 0x4) getpeername$llc(r9, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0xffffffffffffffd1) 03:13:15 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40002, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e20, 0x800, @mcast2, 0x5914}, @in6={0xa, 0x4e21, 0xf7, @remote, 0x8}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e23, 0x5, @loopback, 0x80}, @in6={0xa, 0x4e24, 0x400, @loopback, 0x20}], 0x90) syz_emit_ethernet(0x1e, &(0x7f0000000040)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@can={0xc, {{0x3, 0x7f, 0x3, 0xfffffffffffffffb}, 0x8, 0x3, 0x0, 0x0, "9f220dcc1323b8ad"}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x553, 0x4cc]}) 03:13:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x19, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000200)={0x7f, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffd}) [ 281.868217] QAT: Invalid ioctl 03:13:15 executing program 5: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) capset(&(0x7f0000000080)={0x20071026, r0}, &(0x7f00000000c0)={0x8, 0x5, 0x7, 0x5c, 0x10000, 0x4}) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(0xffffffffffffffff, &(0x7f0000a16000)=""/71, 0x47) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000040)='net/if_inet6\x00') 03:13:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000100"}, &(0x7f0000000040)=0x1e) [ 281.962097] QAT: Invalid ioctl 03:13:15 executing program 0: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x5, 0xfff}, {0x2, 0x6}], r1}, 0x18, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x6, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 03:13:15 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x31, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 2: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = shmget(0x1, 0x2000, 0x400, &(0x7f0000ffb000/0x2000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) getresgid(&(0x7f0000000080)=0x0, &(0x7f0000000180), &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) r7 = gettid() r8 = getpgid(0x0) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000500)={{0xa60c, r2, r3, r4, r6, 0x100, 0x1}, 0xffffffffefd995ab, 0x2, 0x7, 0xffffffffb6ac9550, r7, r8, 0x10001}) syz_mount_image$reiserfs(&(0x7f0000000580)='reiserfs\x00', &(0x7f00000005c0)='./file0\x00', 0x7fffffff, 0x5, &(0x7f0000000840)=[{&(0x7f0000000600)="2a41815be853084c1785b5403e5c32446923e9a9", 0x14, 0x10001}, {&(0x7f0000000640)="613dc12f97acda8edfd27352abf5231a7d916cdf636a962a03f4a8538b1d9bbae6ab463adbb89cde8146661c218ac972e9", 0x31, 0x3}, {&(0x7f0000000680)="9fd075b5a65fab89ea0f20a93acf10fd4a8fcbb9c51466004a956512726fc7d5e72fd85c0e992b0793d9a72d7d879d7c97ec0e1ac337c4688915748b6a9a20cbe8245d93a309ea4ccb1fd3aea2d4692fc7b1a229", 0x54, 0x9881}, {&(0x7f0000000700)="bd9c3fd62b656ede6096802c3b6a9f5a654d30c74d5b567a2c4265d3f680076401b780ee367d9609a5bf6e4d3df393939968e8f20dba4876b553105c06f1d5d1f6a752e6f3469ded51ef65faf6090c278ca0bb4f342f9501f8aaafa443f0f7e699157bb45e3b149abc8aa064938ff8ad6272807ba026a371ce02358e0ffd91ff3bc660692067683711b94b88d3fa3e228bb03e92dbcf8c0cd56bb22e5e51fd2f3bd7eb9abbf7ccea473564a4b9ebaed5ef4c2a27404e0e83b011449c59ea59944e12b6d8fcec8349044b1390beabee6be84e636320aa3c28e0fa5c2fffcbc2dbb2abba41c7f0", 0xe6, 0x6}, {&(0x7f0000000800)="fa", 0x1, 0x216c}], 0x870, &(0x7f00000008c0)={[{@tails_small='tails=small'}, {@balloc_noborder='block-allocator=noborder'}, {@noquota='noquota'}, {@noattrs='noattrs'}, {@usrquota='usrquota'}, {@acl='acl'}, {@noattrs='noattrs'}, {@acl='acl'}, {@expose_privroot='expose_privroot'}], [{@euid_eq={'euid', 0x3d, r2}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@euid_gt={'euid>', r5}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, '{.'}}, {@euid_lt={'euid<', r4}}, {@euid_gt={'euid>', r2}}, {@smackfsdef={'smackfsdef', 0x3d, 'eth0#'}}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@xdp, &(0x7f0000000140)=0x80) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$KVM_SET_TSS_ADDR(r10, 0xae47, 0xd000) r11 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r11, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt(r0, 0x800000010d, 0x1, &(0x7f0000000000), 0x0) ioctl$BINDER_THREAD_EXIT(r9, 0x40046208, 0x0) 03:13:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000100)={r2, 0x4}) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000140)=""/190, 0xbe}, &(0x7f0000000200), 0x40}, 0x20) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"54e0524f585900"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000d0100"}, &(0x7f0000000040)=0x1e) 03:13:15 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000010d00"}, &(0x7f0000000040)=0x1e) [ 282.260597] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app [ 282.296532] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 03:13:15 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20000, 0x0) mq_timedsend(r1, &(0x7f0000000080)="af8f3c6d92e233c57185f09daedf544e3ca418a35824b5490c8a98bf60cc6172856a67a6ede73a", 0x27, 0xb, &(0x7f00000000c0)) 03:13:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x80005, 0x400) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r1, &(0x7f0000000280)=""/4096, 0x1000, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x70e000) 03:13:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000010d00"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x100003) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0xa000, 0x0) setsockopt$llc_int(r1, 0x10c, 0xf, &(0x7f0000000380)=0x1, 0x4) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x1000, @loopback, 0x1}}, [0x0, 0x3, 0x6, 0x7, 0x100000000000, 0x5, 0x8, 0x8, 0x1, 0x5, 0x9, 0x4, 0xe478, 0x1]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0x0, 0x80}, &(0x7f0000000300)=0x8) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000190007031dfffd946f61830002200a00090000e7fe1c40000c1ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ebea8653b1cc7e63975c02007b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:13:16 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x6, 0x400) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000001c0)={0x0, @bt={0x4, 0x1, 0x1, 0x1, 0x9, 0x4, 0x9, 0x2fa491e4, 0x4, 0x5617, 0x5, 0xfff, 0x101, 0xffffffffffffffe1, 0xc, 0x1}}) read(r0, &(0x7f0000a16000)=""/71, 0x47) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200000, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000080)={0x0, @raw_data="f15e4cecea98960b3e4ff0360c1cf8e4989b6b016b65581d9a2799e5fd91deadde4c7e8799a8464c3ab9925b31351c151e572ce3e73138c4f45863476b38ae36f4e3000ef547ebc918566e5f8881e8e03d41dd103e759d9364445bfb809beacf128286a40f372c0ebdc358c8cd50ef0228a0b51a3f062c0d18a93689212b4390e6e29072372a152e6d0afe1368ac8605aacb93cefea0862e3061cdd156af46aefccd45303eb3f83f2592edac5448bf6da0284e262d682642397d8f45b5c7f34fb41fb6f588668253"}) 03:13:16 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) listen(r0, 0x400) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) 03:13:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859010d00"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 5: r0 = timerfd_create(0x0, 0x0) fcntl$addseals(r0, 0x409, 0x2) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:16 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 282.636337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 03:13:16 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590d0100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000010d00"}, &(0x7f0000000040)=0x1e) [ 282.765168] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 03:13:16 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) splice(0xffffffffffffffff, &(0x7f0000000100), 0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)="b10b8a86", 0x4}], 0x1, &(0x7f0000000200)}, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000000240)=0xe2b, 0xfffffffffffffdc5) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x200, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000001540)=&(0x7f0000001500)) r3 = syz_open_dev$video4linux(&(0x7f0000001580)='/dev/v4l-subdev#\x00', 0x401, 0x80) ioctl$VIDIOC_G_FBUF(r3, 0x8030560a, &(0x7f0000000280)={0x2, 0x2, &(0x7f0000000400)="fd7c6feaae4a9c8719f7513113614dff852b458919adde52b3f34e1976c0bec3ef09fc340aaa345f12ee8d3ceb0dec47ef1e211534be78255d931f267d79d2e452475d2f6da5d16f7710ca1566d46949c097b9bb38cdbc108d4cc6514836eec3e83e54f38416f3c959a32d691ec3cc67c646fcfef9823f330bf494e6de0c5dc04ff6338b4902478c9993421b7be371c405ffafd48aa570eb292256121f8bed334bcccaad6fd2857b4a1b62c1baa0e808e7a3784893cdce2f3b01638aac9ae11d8ffe8595179d5e08e328dbd6eb64f4547fe8bfb08cc12dae5c", {0x1, 0x5, 0x33524742, 0x0, 0xffffffff, 0x3, 0xf, 0x7aa9}}) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000340)={0x0, 0x5, 0x4, 0x1, {0x0, 0x2710}, {0x4, 0xc, 0x4, 0x7, 0x0, 0x81, "d6f20ada"}, 0x614, 0x7, @userptr=0xffff, 0x4}) write(r2, &(0x7f00000015c0)="a22a31fe0395e29e2a8095ef6be89c4cb23e0639827bdc58743d75de9acce6b500c52348c816af4a1e69b93cf30944b90fb43d4c237e81f29776d98266592599eb3b48ed1394cae33e31c02edc43f832e96af6eda9bae072fd518132579fe350024216d1f8a89b0a1238dcea84d63a36", 0x70) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000040)=@can, 0x80, &(0x7f00000037c0), 0x0, &(0x7f0000003880)=""/40, 0x28}, 0x0) read(r0, &(0x7f0000002640)=""/4096, 0x1000) 03:13:16 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40200) fcntl$getown(r0, 0x9) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) fchdir(r1) read(r1, &(0x7f0000a16000)=""/71, 0x47) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x480400, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000010}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0xa8, r3, 0x401, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7ff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x2a}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x24008800}, 0x20000000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000280)={r4, 0x1, 0x6}, 0x10) 03:13:16 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000001c0)={0x1, r4}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U+', 0x3}, 0x28, 0x0) 03:13:16 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000d0100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000001c0)={0x1, r4}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U+', 0x3}, 0x28, 0x0) 03:13:16 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 2: ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x4d, 0x0, 0x3a4}]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x5, 0x509000) connect$can_bcm(r1, &(0x7f0000000380), 0x10) close(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000005c0)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x8400}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000600)={0x70, &(0x7f0000000240)=[{}]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={"76657400000000000000000400", 0x43732e5398416f1a}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x21) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f00000002c0)={0x0, 0x8, [], @raw_data=[0xfffffffffffffffd, 0x7524, 0x400, 0x4, 0x1, 0x8000, 0x493, 0x3, 0x8, 0xf9, 0xd99f, 0x1, 0x2, 0xffff, 0x7fff, 0x2, 0xb7, 0x3, 0x0, 0x7, 0x7, 0x20, 0x4, 0x10000, 0x6, 0xf0f0, 0x8, 0xffffffff80000001, 0x4, 0x81, 0x5, 0x1]}) 03:13:16 executing program 5: r0 = timerfd_create(0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000100)=""/110, 0x6e) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x77359400}, {r1, r2+30000000}}, &(0x7f00000000c0)) 03:13:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r1 = timerfd_create(0x4, 0x800) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r1, &(0x7f0000000200)=""/71, 0x47) 03:13:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000100"}, &(0x7f0000000040)=0x1e) 03:13:16 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000001c0)={0x1, r4}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U+', 0x3}, 0x28, 0x0) 03:13:16 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000100"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8200003) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x80b) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000000)={0x6}) fallocate(r0, 0x20, 0x0, 0x10000) 03:13:17 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) rt_sigtimedwait(&(0x7f0000000140)={0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)={0x77359400}, 0x8) read(r0, &(0x7f0000000040)=""/71, 0x47) socketpair(0x7, 0x1, 0x1c, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000200)={0x2}, 0x0, &(0x7f0000000240), 0x8) 03:13:17 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000001c0)={0x1, r4}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U+', 0x3}, 0x28, 0x0) 03:13:17 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900010d00"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x600210) r1 = memfd_create(&(0x7f0000000080)="73970ddb08df8c656c667b7070703070707031236d643573756d00", 0x0) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f00000003c0)="034c28436f38d7112d6d546b4a654641714010bb81636cbe184c01d5d6199b688f88170d099cd6b6cf5c0c56b2d6e313f73383a34f3abd3bb9d2c29c8062539d21a85a77fe39b4b3455e52d72b53d3642f78b37117509aec3958de72555216783fec4942022fbd2423") pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x38f, 0x6, 0x8, 0xfffffffffffffffb, 0x0, 0x2, 0x440, 0x2, 0xec, 0x5, 0x2, 0x5, 0x9, 0x9, 0x2, 0x0, 0x3f, 0x8, 0x8, 0x5, 0x8001, 0x993e, 0xfffffffffffffffc, 0x5, 0x100000001, 0x4, 0x6, 0x0, 0x5, 0x0, 0x1000, 0x4, 0x8a, 0x8, 0x100000001, 0x401, 0x0, 0xde, 0x3, @perf_config_ext={0x9, 0x8}, 0x12000, 0x2f02, 0x7fffffff, 0x5, 0x10001, 0x7fff, 0x3}, r2, 0x10, r1, 0x3) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000001c0), 0x4) 03:13:17 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f00000001c0)={0x1, r4}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000d0100"}, &(0x7f0000000040)=0x1e) 03:13:17 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 5: r0 = timerfd_create(0x0, 0x80800) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x14) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000080)={@rand_addr=0x5, @local, @remote}, 0xc) 03:13:18 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000001c0)={0x1, r3}) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x600210) r1 = memfd_create(&(0x7f0000000080)="73970ddb08df8c656c667b7070703070707031236d643573756d00", 0x0) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f00000003c0)="034c28436f38d7112d6d546b4a654641714010bb81636cbe184c01d5d6199b688f88170d099cd6b6cf5c0c56b2d6e313f73383a34f3abd3bb9d2c29c8062539d21a85a77fe39b4b3455e52d72b53d3642f78b37117509aec3958de72555216783fec4942022fbd2423") pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x38f, 0x6, 0x8, 0xfffffffffffffffb, 0x0, 0x2, 0x440, 0x2, 0xec, 0x5, 0x2, 0x5, 0x9, 0x9, 0x2, 0x0, 0x3f, 0x8, 0x8, 0x5, 0x8001, 0x993e, 0xfffffffffffffffc, 0x5, 0x100000001, 0x4, 0x6, 0x0, 0x5, 0x0, 0x1000, 0x4, 0x8a, 0x8, 0x100000001, 0x401, 0x0, 0xde, 0x3, @perf_config_ext={0x9, 0x8}, 0x12000, 0x2f02, 0x7fffffff, 0x5, 0x10001, 0x7fff, 0x3}, r2, 0x10, r1, 0x3) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000001c0), 0x4) 03:13:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x180) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000100)}) read(r1, &(0x7f0000000180)=""/71, 0xf942) r2 = open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x20) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000080)=0x9, 0x4) 03:13:18 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000001c0)={0x1, r3}) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:18 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000001c0)={0x1, r3}) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000100"}, &(0x7f0000000040)=0x1e) [ 284.682919] kauditd_printk_skb: 606 callbacks suppressed [ 284.682949] audit: type=1804 audit(1540869198.292:648): pid=9106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir401414820/syzkaller.0DE54T/77/file0" dev="sda1" ino=16752 res=1 03:13:18 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r2 = getpid() r3 = dup(0xffffffffffffff9c) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) tgkill(r1, r2, 0x34) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000000c0)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000100)={0x0, r5}) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000080)=0x6) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000200)={{0x0, 0x8001, 0x9, 0x46, 0x100000000, 0x5}, 0x2, 0x100, 0x80, 0x8, 0x73a, "09b645025f8c356f52f2bc17db7dcbe4c87fd71b41692b9847b0112940a927c2f97d51876d71e386249a21f099636994458105ee6602b4c6c4c88d3f3a6b07dd933965197ce0db362aba665407f2507fd50d29fcd9d58c65f73a818cb9e65daedd25d27b21dcb517ae9055c8fc1610a547786392bd47fdeeceedb7bd5b93feed"}) [ 284.915125] audit: type=1800 audit(1540869198.302:649): pid=9106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16752 res=0 [ 284.984227] audit: type=1804 audit(1540869198.352:650): pid=9106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir401414820/syzkaller.0DE54T/77/file0" dev="sda1" ino=16752 res=1 03:13:18 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x600210) r1 = memfd_create(&(0x7f0000000080)="73970ddb08df8c656c667b7070703070707031236d643573756d00", 0x0) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f00000003c0)="034c28436f38d7112d6d546b4a654641714010bb81636cbe184c01d5d6199b688f88170d099cd6b6cf5c0c56b2d6e313f73383a34f3abd3bb9d2c29c8062539d21a85a77fe39b4b3455e52d72b53d3642f78b37117509aec3958de72555216783fec4942022fbd2423") pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x38f, 0x6, 0x8, 0xfffffffffffffffb, 0x0, 0x2, 0x440, 0x2, 0xec, 0x5, 0x2, 0x5, 0x9, 0x9, 0x2, 0x0, 0x3f, 0x8, 0x8, 0x5, 0x8001, 0x993e, 0xfffffffffffffffc, 0x5, 0x100000001, 0x4, 0x6, 0x0, 0x5, 0x0, 0x1000, 0x4, 0x8a, 0x8, 0x100000001, 0x401, 0x0, 0xde, 0x3, @perf_config_ext={0x9, 0x8}, 0x12000, 0x2f02, 0x7fffffff, 0x5, 0x10001, 0x7fff, 0x3}, r2, 0x10, r1, 0x3) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000001c0), 0x4) 03:13:18 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x4000000, 0x0, 0x2, 0x7fffffff}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000d0100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 5: r0 = timerfd_create(0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:auditd_var_run_t:s0\x00', 0x26, 0x3) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xb1, 0x400800) shutdown(r1, 0x1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 285.086277] audit: type=1800 audit(1540869198.352:651): pid=9106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16752 res=0 03:13:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 285.207013] audit: type=1804 audit(1540869198.352:652): pid=9107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir401414820/syzkaller.0DE54T/77/file0" dev="sda1" ino=16752 res=1 03:13:18 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:18 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)={0xffffffff80000001}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 285.381982] Unknown ioctl 1077980791 [ 285.408159] Unknown ioctl 1077980791 03:13:19 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x107ffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000086fff4)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r4 = getpgrp(r3) r5 = getpid() kcmp$KCMP_EPOLL_TFD(r5, r4, 0x7, r0, &(0x7f0000000000)={r2, r1}) 03:13:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:19 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400, 0x0) getsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:13:19 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000100"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:19 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x5, 0x8, 0x9, 0x3, 0x1000}, 0x10) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:19 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000004c0)={0x3, &(0x7f0000000480)=[{}, {0x0}, {}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) syz_open_dev$sndctrl(&(0x7f0000000800)='/dev/snd/controlC#\x00', 0x100, 0x2840) perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x6, 0xff, 0xa2e, 0x3, 0x0, 0x27, 0x2a5045d1e29e6aa, 0x2, 0x1, 0x1, 0x6d, 0x1, 0x8, 0xca3, 0x10001, 0x6, 0x5, 0x1, 0x101, 0x9, 0x4af, 0x200, 0x6f, 0x1, 0x80000001, 0x60a, 0x5c37, 0x8, 0x6, 0x785, 0x100000001, 0x9d2, 0x9, 0x4, 0xff, 0x100000001, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0xffff}, 0x2, 0x8, 0xffff, 0x1, 0x1ff, 0x7, 0xb8d4}, r2, 0xb, r0, 0x2) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000500)={r1, 0x1}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000400)={0x15, 0xce, &(0x7f0000000300)="a496f9708f84c18ffc76c0cde7ee0be5b82babf725ac80a4e8366ceb1db9d5d873b99e24ff7dc972e3a54ab319bc3afd668dc966f1713952c35db64b1b7ccf1195fde10630bbb99f7b518b2ca229dfbcde2ecdb4e4eff314a6180121e1fe28d3c5f23db3a681856ace26fac676d6b897c6f8d4b6b0af6990958b0393fd0746189a3c287c4516a4445b4c01db8764c1520a8d649166d10913f9ad73e64e8c09d96dde8726383b496585e5b0d0204e7accf22cc3beed47c7c1c8c9b605865ac8de24133b803f1f14c65a3c260b6bba"}) getsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) fcntl$setstatus(r4, 0x4, 0x800) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/195, 0xc3, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x10, &(0x7f0000000680)={&(0x7f0000000600)=""/110, 0x6e}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'lo\x00'}) sendto$inet6(r3, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4203, 0x0) timerfd_settime(r4, 0xfffffffffffffffd, &(0x7f0000000180)={{0x77359400}}, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast2, 0x4e21, 0x0, 'none\x00', 0x18, 0x3f}, 0x2c) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000440)={0x6, 0x7fff, 0xff}, 0xc) ioctl$PIO_FONT(r5, 0x4b61, &(0x7f00000002c0)="5f8f") ftruncate(r5, 0x7fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 03:13:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = socket$inet_dccp(0x2, 0x6, 0x0) accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) 03:13:19 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 285.944641] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:13:19 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000d0100"}, &(0x7f0000000040)=0x1e) [ 286.042160] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20001 03:13:19 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000200)={0x2, 0x2, 0x4}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x4000, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d756e69782c73697a653d3078303030303030303030303030303166662c76657273696f6e3d3970323030302e752c657569643d927ade5157195623b4f9a0e3d45682cb8c5ce54a3de7d836fb1aaf24e4ef23ce1f51b9d8233e4d1fe7440b8542717038819e7df61747ba", @ANYRESDEC=r2, @ANYBLOB=',\x00']) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 286.266898] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20001 03:13:19 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000004c0)={0x3, &(0x7f0000000480)=[{}, {0x0}, {}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) syz_open_dev$sndctrl(&(0x7f0000000800)='/dev/snd/controlC#\x00', 0x100, 0x2840) perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x6, 0xff, 0xa2e, 0x3, 0x0, 0x27, 0x2a5045d1e29e6aa, 0x2, 0x1, 0x1, 0x6d, 0x1, 0x8, 0xca3, 0x10001, 0x6, 0x5, 0x1, 0x101, 0x9, 0x4af, 0x200, 0x6f, 0x1, 0x80000001, 0x60a, 0x5c37, 0x8, 0x6, 0x785, 0x100000001, 0x9d2, 0x9, 0x4, 0xff, 0x100000001, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0xffff}, 0x2, 0x8, 0xffff, 0x1, 0x1ff, 0x7, 0xb8d4}, r2, 0xb, r0, 0x2) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000500)={r1, 0x1}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000400)={0x15, 0xce, &(0x7f0000000300)="a496f9708f84c18ffc76c0cde7ee0be5b82babf725ac80a4e8366ceb1db9d5d873b99e24ff7dc972e3a54ab319bc3afd668dc966f1713952c35db64b1b7ccf1195fde10630bbb99f7b518b2ca229dfbcde2ecdb4e4eff314a6180121e1fe28d3c5f23db3a681856ace26fac676d6b897c6f8d4b6b0af6990958b0393fd0746189a3c287c4516a4445b4c01db8764c1520a8d649166d10913f9ad73e64e8c09d96dde8726383b496585e5b0d0204e7accf22cc3beed47c7c1c8c9b605865ac8de24133b803f1f14c65a3c260b6bba"}) getsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) fcntl$setstatus(r4, 0x4, 0x800) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/195, 0xc3, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x10, &(0x7f0000000680)={&(0x7f0000000600)=""/110, 0x6e}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'lo\x00'}) sendto$inet6(r3, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4203, 0x0) timerfd_settime(r4, 0xfffffffffffffffd, &(0x7f0000000180)={{0x77359400}}, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast2, 0x4e21, 0x0, 'none\x00', 0x18, 0x3f}, 0x2c) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000440)={0x6, 0x7fff, 0xff}, 0xc) ioctl$PIO_FONT(r5, 0x4b61, &(0x7f00000002c0)="5f8f") ftruncate(r5, 0x7fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 03:13:19 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:19 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) fcntl$setsig(r0, 0xa, 0x1d) 03:13:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:20 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 5: r0 = timerfd_create(0x0, 0x800000000) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 286.475471] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20001 03:13:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000004c0)={0x3, &(0x7f0000000480)=[{}, {0x0}, {}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) syz_open_dev$sndctrl(&(0x7f0000000800)='/dev/snd/controlC#\x00', 0x100, 0x2840) perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x6, 0xff, 0xa2e, 0x3, 0x0, 0x27, 0x2a5045d1e29e6aa, 0x2, 0x1, 0x1, 0x6d, 0x1, 0x8, 0xca3, 0x10001, 0x6, 0x5, 0x1, 0x101, 0x9, 0x4af, 0x200, 0x6f, 0x1, 0x80000001, 0x60a, 0x5c37, 0x8, 0x6, 0x785, 0x100000001, 0x9d2, 0x9, 0x4, 0xff, 0x100000001, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0xffff}, 0x2, 0x8, 0xffff, 0x1, 0x1ff, 0x7, 0xb8d4}, r2, 0xb, r0, 0x2) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000500)={r1, 0x1}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000400)={0x15, 0xce, &(0x7f0000000300)="a496f9708f84c18ffc76c0cde7ee0be5b82babf725ac80a4e8366ceb1db9d5d873b99e24ff7dc972e3a54ab319bc3afd668dc966f1713952c35db64b1b7ccf1195fde10630bbb99f7b518b2ca229dfbcde2ecdb4e4eff314a6180121e1fe28d3c5f23db3a681856ace26fac676d6b897c6f8d4b6b0af6990958b0393fd0746189a3c287c4516a4445b4c01db8764c1520a8d649166d10913f9ad73e64e8c09d96dde8726383b496585e5b0d0204e7accf22cc3beed47c7c1c8c9b605865ac8de24133b803f1f14c65a3c260b6bba"}) getsockopt$inet6_udp_int(r3, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) fcntl$setstatus(r4, 0x4, 0x800) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/195, 0xc3, 0x2, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x10, &(0x7f0000000680)={&(0x7f0000000600)=""/110, 0x6e}}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000080)={'lo\x00'}) sendto$inet6(r3, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4203, 0x0) timerfd_settime(r4, 0xfffffffffffffffd, &(0x7f0000000180)={{0x77359400}}, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x0, @multicast2, 0x4e21, 0x0, 'none\x00', 0x18, 0x3f}, 0x2c) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000440)={0x6, 0x7fff, 0xff}, 0xc) ioctl$PIO_FONT(r5, 0x4b61, &(0x7f00000002c0)="5f8f") ftruncate(r5, 0x7fff) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 03:13:20 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) timer_create(0x2, &(0x7f0000000200)={0x0, 0x20, 0x4, @thr={&(0x7f0000000040)="b1df97ff7335e37c05018440e5e9dd3367b05ee6f9331d022979e5bb9c3de4d68a5dbd273a5918eb1fe2a05b92949c16418eab17f2c405c6323fc8125ff3068cacd7768f2bf8f875efd8328ac1c481582a3c42f7d5f5d56066b2252deff52eb79c705dc5082313ac0ef3ea9fa4da2a2da5bb1aee7b2c9dbbb431a8b12e616b1a9defe48b6f7720faffc81697b54b966a3b3ceed4fcc9e1d5705ed5e8b7f02da54aefcb1c657a0bbd879ade0dbd6382aad9a28e027e", &(0x7f0000000100)="e12e8c9c1d8d91326fa9510309b1c96ca7f6ff355ae91dd4db51bf9d70cb120e445f1ecd9a80e46ad141edba77f6c072799952adf14a4d4f511270707b2385e18caba2205a155464536c6ae081e895bb3e92542692439a5ca562c88e858c7576c2258fe5897fe4d3f27c3cb8be8d31f83c391f0cea71d9928e9e991a02e3f9b77a4aad2ff473c237ea2dc397054844135d6cdaba058b481835b252ce7ba063d3ea38903cdd4e550d9996a7964fb9411d3b6a0a60b239491c22d0ee9e0276771185ebae63fa50f021910b9db5b498361a89494014494a2abd6c92f9eceb82fd64e70885ecb20cc10ce86a84a46ff027b66763e8b19a8d"}}, &(0x7f0000000240)=0x0) timer_getoverrun(r1) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:20 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 286.977161] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:20001 03:13:20 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:20 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = socket$inet6(0xa, 0x3, 0x5) getsockopt$inet6_dccp_int(r1, 0x21, 0x1b, &(0x7f0000000040), &(0x7f0000000080)=0x4) read(r0, &(0x7f0000a16000)=""/71, 0x47) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 03:13:20 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:20 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r0, r0, 0x80000) timerfd_settime(r2, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, &(0x7f0000000080)) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x3}) 03:13:21 executing program 5: r0 = timerfd_create(0xffffffffffffffff, 0x4) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:21 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:21 executing program 2: lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=ANY=[], &(0x7f0000000500)='ext4\x00', 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x101001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, r0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x4, {{0xc, 0x1, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}, 0x2, 0xffffffff}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000006c0)) accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000a00), &(0x7f00000005c0)=0x60, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000700)=""/151) 03:13:21 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0xfb) 03:13:21 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1f, 0x500c0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000080)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:21 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:21 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:21 executing program 5: r0 = timerfd_create(0x0, 0x0) mount$9p_rdma(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x120040, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@fscache='fscache'}, {@rq={'rq', 0x3d, 0x1}}, {@common=@loose='loose'}, {@timeout={'timeout', 0x3d, 0x10001}}, {@sq={'sq', 0x3d, 0x100000000}}, {@sq={'sq', 0x3d, 0x2}}, {@timeout={'timeout', 0x3d, 0x3f}}, {@timeout={'timeout', 0x3d, 0x5}}, {@common=@cache_none='cache=none'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'vmnet1-'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/input/mouse#\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz1\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vmnet0posix_acl_accessppp1em0-'}}, {@smackfsdef={'smackfsdef', 0x3d, 'syz1\x00'}}]}}) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0xffff, 0x40000) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000003c0)={0x0, @bt={0x423, 0x5, 0x1, 0x1, 0x8f74, 0x3, 0x200, 0x5, 0xff, 0x7, 0x0, 0x20c580000000, 0x3, 0xe6, 0x8, 0x4}}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8001, 0x40) openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x32) [ 288.003404] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 288.038805] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 288.053530] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 288.115384] EXT4-fs error (device loop2): ext4_iget:4849: inode #2: comm syz-executor2: root inode unallocated [ 288.131087] EXT4-fs (loop2): get root inode failed [ 288.137892] EXT4-fs (loop2): mount failed [ 288.486042] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 288.496364] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 288.506545] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 288.519861] EXT4-fs error (device loop2): ext4_iget:4849: inode #2: comm syz-executor2: root inode unallocated [ 288.532014] EXT4-fs (loop2): get root inode failed [ 288.538224] EXT4-fs (loop2): mount failed 03:13:22 executing program 2: lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=ANY=[], &(0x7f0000000500)='ext4\x00', 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x101001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, r0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x4, {{0xc, 0x1, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}, 0x2, 0xffffffff}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000006c0)) accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000a00), &(0x7f00000005c0)=0x60, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000700)=""/151) 03:13:22 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:22 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:22 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:22 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fadvise64(r1, 0x0, 0x4, 0x5) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:22 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:22 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:22 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:22 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x5, 0x2) read(r0, &(0x7f0000a16000)=""/71, 0x47) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x21, &(0x7f00000000c0)={[{@mode={'mode', 0x3d, 0xf86}}, {@mode={'mode', 0x3d, 0x8}}]}) 03:13:22 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 289.020064] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 289.050219] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 289.075500] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 289.109197] EXT4-fs error (device loop2): ext4_iget:4849: inode #2: comm syz-executor2: root inode unallocated [ 289.122119] EXT4-fs (loop2): get root inode failed [ 289.127511] EXT4-fs (loop2): mount failed 03:13:23 executing program 2: lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=ANY=[], &(0x7f0000000500)='ext4\x00', 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x101001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, r0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x4, {{0xc, 0x1, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}, 0x2, 0xffffffff}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000006c0)) accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000a00), &(0x7f00000005c0)=0x60, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000700)=""/151) 03:13:23 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:23 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:23 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x22000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@context={'context', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x4}}, {@measure='measure'}]}}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x20040) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x8c10) 03:13:23 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:23 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:23 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x1f, &(0x7f0000000080)=0x90da, 0x4) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:23 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:23 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000d0100"}, &(0x7f0000000040)=0x1e) [ 289.988231] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 290.004639] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 290.015768] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 290.046829] EXT4-fs error (device loop2): ext4_iget:4849: inode #2: comm syz-executor2: root inode unallocated [ 290.060600] EXT4-fs (loop2): get root inode failed [ 290.066139] EXT4-fs (loop2): mount failed 03:13:24 executing program 2: lsetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=ANY=[], &(0x7f0000000500)='ext4\x00', 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x101001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r3 = dup2(r0, r0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000300)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000440), r2, r3}}, 0x18) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f00000000c0)=0x10d060000) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x4, {{0xc, 0x1, 0x1}, 0x2}}, 0x18) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0xf30c000000000000, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r4, 0xc05c5340, &(0x7f0000000200)={0x2, 0x2, 0x7, {r7, r8+30000000}, 0x2, 0xffffffff}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000006c0)) accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000a00), &(0x7f00000005c0)=0x60, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000700)=""/151) 03:13:24 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendto$packet(r0, &(0x7f0000000140)="cf6be1783700e9000013005886fe8ee89c99c448669f0c52c4c75a31", 0x1c, 0x0, &(0x7f00000002c0)={0x11, 0x17, r1, 0x1, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) timerfd_settime(r0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)) read(r2, &(0x7f0000a16000)=""/71, 0x47) 03:13:24 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:24 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:24 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:24 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:24 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:24 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:24 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:24 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:24 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) write$vnet(r1, &(0x7f0000000200)={0x1, {&(0x7f0000000080)=""/94, 0x5e, &(0x7f0000000100)=""/238, 0x3, 0x3}}, 0x68) 03:13:24 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000100"}, &(0x7f0000000040)=0x1e) [ 290.927188] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 290.963744] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 290.981247] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 291.012204] EXT4-fs error (device loop2): ext4_iget:4849: inode #2: comm syz-executor2: root inode unallocated [ 291.024995] EXT4-fs (loop2): get root inode failed [ 291.030013] EXT4-fs (loop2): mount failed 03:13:25 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:25 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:25 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:25 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 5: timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(0xffffffffffffffff, &(0x7f0000a16000)=""/71, 0x47) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6f94646d61202f6d656d6f7279202d6d656d6e7279202f6d656d6f7279202f6d656d6f727920"], 0x26) 03:13:25 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000000040)=""/71, 0xfffffffffffffeef) 03:13:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000240)=""/4096, 0x2e, &(0x7f0000000000)=""/46, 0xfd, &(0x7f0000000080)=""/253}) timer_create(0x3, &(0x7f0000000040)={0x0, 0x2b, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000002980)=0x0) timer_gettime(r0, &(0x7f00000029c0)) r1 = syz_open_procfs(0x0, &(0x7f0000002940)='net/dev_snmp6\x00') preadv(r1, &(0x7f0000002880)=[{&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000000180)=""/159, 0x9f}, {&(0x7f0000002280)=""/167, 0xa7}, {&(0x7f0000002340)=""/231, 0xe7}, {&(0x7f0000002440)=""/242, 0xf2}, {&(0x7f0000002540)=""/244, 0xf4}, {&(0x7f0000002640)=""/127, 0x7f}, {&(0x7f00000026c0)=""/187, 0xbb}, {&(0x7f0000002780)=""/232, 0xe8}], 0x9, 0x7ffffffff000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000002a00), &(0x7f0000002a40)=0x4) 03:13:25 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 5: r0 = timerfd_create(0x1, 0x0) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) socket$pppoe(0x18, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000040)={0x1, 0x5}, 0x2) mq_timedreceive(r1, &(0x7f0000000100)=""/4096, 0x1000, 0x8, 0x0) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:25 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000040)={0x9, 0x4, 0xfffffffffffffffa}) 03:13:25 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 5: r0 = timerfd_create(0x0, 0x80000) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:25 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 292.265146] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:25 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:26 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x381) [ 292.360673] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000040)={0x9, 0x4, 0xfffffffffffffffa}) 03:13:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 5: r0 = timerfd_create(0x7, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x8}) clock_gettime(0x7, &(0x7f0000000080)) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000000100)=""/71, 0x10e) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8000, 0x0) 03:13:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 5: r0 = timerfd_create(0x0, 0x800) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000280)={0x3, 0x4, 0x401, 0x9, &(0x7f0000000380)=""/9, 0xf4, &(0x7f00000000c0)=""/244, 0x94, &(0x7f00000002c0)=""/148}) 03:13:26 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 292.720955] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 292.837201] QAT: Invalid ioctl 03:13:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000040)={0x9, 0x4, 0xfffffffffffffffa}) [ 292.861754] QAT: Invalid ioctl 03:13:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x100, 0xffffffffffffa9a1, 0x1, 0x6, 0x4, 0x2}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 293.065951] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 293.078520] QAT: Invalid ioctl [ 293.089595] QAT: Invalid ioctl 03:13:26 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:26 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000040)={0x9, 0x4, 0xfffffffffffffffa}) 03:13:26 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3ff, 0x44000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xffffffffffffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e23, 0x5, @mcast2}}}, &(0x7f00000001c0)=0x84) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 293.361790] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)={0x1008, 0x8, "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"}, 0x400) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r1, &(0x7f0000a16000)=""/71, 0x47) 03:13:27 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) 03:13:27 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) timerfd_create(0x7, 0x0) read(r0, &(0x7f0000a16000)=""/71, 0x47) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20000, 0x0) 03:13:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 293.566419] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:27 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:27 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040)={0x400}, &(0x7f0000000080), &(0x7f0000000100)={r1, r2+30000000}, 0x8) read(r0, &(0x7f0000000140)=""/19, 0x13) 03:13:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 293.871130] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:27 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:27 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:27 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 2: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:28 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:28 executing program 5: r0 = timerfd_create(0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0x47532f0a, 0x4, 0x7, 0x7fffffff, 0x9, 0x2, 0x2, 0x100000000}, &(0x7f0000000080)={0x2, 0x37, 0x6, 0x8, 0xfffffffffffff3c3, 0xf47, 0xbee3, 0x800}, &(0x7f00000000c0)={0x2643, 0x100000000, 0x0, 0xfa0b, 0x7fffffff, 0x7, 0x2, 0x317c}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1}, 0x8}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x2000, 0x0) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) write$P9_RLOCK(r3, &(0x7f0000000240)={0x8, 0x35, 0x2, 0x1}, 0x8) read(r0, &(0x7f0000a16000)=""/71, 0x47) r4 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, r4) 03:13:28 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:28 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:28 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 5: r0 = timerfd_create(0x0, 0x0) socketpair(0x4, 0x6, 0xffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0xffffff05) 03:13:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:28 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x10000, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e23, 0x600000000000000, @dev={0xfe, 0x80, [], 0x1c}, 0x3}, 0x1c) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000140)) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f00000001c0)=""/14, &(0x7f0000000200)=0xe) accept$nfc_llcp(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x60) 03:13:28 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:28 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280), 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:28 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280), 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:29 executing program 5: clock_getres(0x6, &(0x7f0000006b40)) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000006b00)) r0 = dup(0xffffffffffffffff) r1 = timerfd_create(0x7, 0xfffffffffffffffd) timerfd_settime(r1, 0x1, &(0x7f0000006b80)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) fsetxattr(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="74727c73f465642e5b7472757374656423107f00000093f76b6a70f6eb33fd23a37aa0001a0cc9cbcb3f242332b50e51b87bb6ffd2cfcd8f38f9d631ad010000004f0187812525b6fdc83b61d304f3a376ad8904c18745b3d5e911dacef3f644e88379f065b0392e97c173071a079e61c9dfb5201c5f233c025fdb7193c98da6e1dd947b207a66f5152c43fc65efa8d9d1140fd60bcabdfbd510cbf041fe7aa98e7e94bfe8572c6f6ec236bf5b296fff5220b62e8174927e8fcd87d5c5bef1bef6130a0cd0b2e512090701ea5c22226fe69f8c65be226e83d7595f97f700000000000000000000"], &(0x7f0000006bc0)='}system/!nodevproc\x00', 0x13, 0x1) read(r1, &(0x7f0000a16000)=""/71, 0x47) 03:13:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:29 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x2, 0x6d, &(0x7f0000000080)=0x8}) 03:13:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 295.610090] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:13:29 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280), 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:29 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)) 03:13:29 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x90, r1, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2c}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xaa45}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x88c}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xa85}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x841}, 0x40) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000000040)=""/71, 0x58) 03:13:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 295.994229] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 03:13:29 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)) 03:13:29 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 296.256376] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 03:13:30 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}}, &(0x7f0000000040)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)) 03:13:30 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:30 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 296.497578] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 03:13:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x1, 0xf9}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000180)={0x5, 0x5, 0x7, 0xfff, 'syz1\x00', 0x4}) r1 = timerfd_create(0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x408000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000005c0)=@sack_info={0x0, 0xfffffffffffffffa, 0x2}, &(0x7f0000000600)=0xc) read$eventfd(r2, &(0x7f00000000c0), 0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000640)={r3, 0x6b, 0x101, 0x2}, &(0x7f0000000680)=0x10) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r1, &(0x7f0000a16000)=""/71, 0x47) linkat(r2, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x0) 03:13:30 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:30 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:30 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:30 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 5: r0 = timerfd_create(0x8000000000000, 0x200000010000) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x4, &(0x7f0000000040)={{r1, r2+30000000}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:31 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:31 executing program 2 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:31 executing program 5: r0 = timerfd_create(0x7, 0x800) timerfd_settime(r0, 0xffffffffffffffff, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 297.561782] FAULT_INJECTION: forcing a failure. [ 297.561782] name failslab, interval 1, probability 0, space 0, times 0 [ 297.622228] CPU: 0 PID: 10112 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 297.630502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.630510] Call Trace: [ 297.630537] dump_stack+0x244/0x39d [ 297.630564] ? dump_stack_print_info.cold.1+0x20/0x20 [ 297.651315] ? lock_downgrade+0x900/0x900 [ 297.655489] should_fail.cold.4+0xa/0x17 [ 297.659569] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.664689] ? lock_downgrade+0x900/0x900 03:13:31 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 297.664711] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.664731] ? proc_fail_nth_write+0x9e/0x210 [ 297.678904] ? proc_cwd_link+0x1d0/0x1d0 [ 297.682988] ? find_held_lock+0x36/0x1c0 [ 297.687096] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.692571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.698124] __should_failslab+0x124/0x180 [ 297.698145] should_failslab+0x9/0x14 [ 297.698165] __kmalloc+0x2e0/0x760 [ 297.709738] ? strncpy_from_user+0x5a0/0x5a0 [ 297.714161] ? fput+0x130/0x1a0 [ 297.717462] ? do_syscall_64+0x9a/0x820 03:13:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) [ 297.721453] ? __x64_sys_memfd_create+0x142/0x4f0 [ 297.726312] ? do_syscall_64+0x9a/0x820 [ 297.730305] __x64_sys_memfd_create+0x142/0x4f0 [ 297.734995] ? memfd_fcntl+0x1910/0x1910 [ 297.739091] do_syscall_64+0x1b9/0x820 [ 297.739110] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.739129] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.739149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.758175] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.763219] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.768256] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.773288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.773314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.773327] RIP: 0033:0x457569 [ 297.773344] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.773353] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 297.773367] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 03:13:31 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x81) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x1, 0x8, 0x5, 0x4, 0x8, 0x400}, 0xfffffffffffffff7}, 0xa) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:31 executing program 2 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) [ 297.773376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 297.773384] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 297.773392] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f2403fd66d4 [ 297.773400] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 03:13:31 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 5: r0 = timerfd_create(0x3, 0x4) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f00000000c0)=""/71, 0x748) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc3, 0x100) [ 297.996398] FAULT_INJECTION: forcing a failure. [ 297.996398] name failslab, interval 1, probability 0, space 0, times 0 03:13:31 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 298.066998] CPU: 1 PID: 10141 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 298.075313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.084704] Call Trace: [ 298.087324] dump_stack+0x244/0x39d [ 298.090980] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.096203] should_fail.cold.4+0xa/0x17 [ 298.100286] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.105433] ? find_held_lock+0x36/0x1c0 [ 298.109516] ? zap_class+0x640/0x640 [ 298.113251] ? __lock_acquire+0x62f/0x4c20 [ 298.117494] ? lock_downgrade+0x900/0x900 [ 298.121649] ? check_preemption_disabled+0x48/0x280 [ 298.121671] ? find_held_lock+0x36/0x1c0 [ 298.130815] ? expand_files.part.8+0x571/0x9a0 [ 298.135418] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.140899] ? find_held_lock+0x36/0x1c0 [ 298.144981] __should_failslab+0x124/0x180 [ 298.149234] should_failslab+0x9/0x14 [ 298.153067] kmem_cache_alloc+0x2be/0x730 [ 298.157238] ? shmem_destroy_callback+0xc0/0xc0 [ 298.161924] shmem_alloc_inode+0x1b/0x40 03:13:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 298.165998] alloc_inode+0x63/0x190 [ 298.169640] new_inode_pseudo+0x71/0x1a0 [ 298.173730] ? prune_icache_sb+0x1c0/0x1c0 [ 298.177985] ? _raw_spin_unlock+0x2c/0x50 [ 298.182155] new_inode+0x1c/0x40 [ 298.185536] shmem_get_inode+0xf1/0x920 [ 298.189527] ? shmem_encode_fh+0x340/0x340 [ 298.193779] ? lock_downgrade+0x900/0x900 [ 298.197950] ? lock_release+0xa10/0xa10 [ 298.201937] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.207404] ? usercopy_warn+0x110/0x110 [ 298.211487] __shmem_file_setup.part.50+0x83/0x2a0 03:13:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 298.216436] shmem_file_setup+0x65/0x90 [ 298.220438] __x64_sys_memfd_create+0x2af/0x4f0 [ 298.225144] ? memfd_fcntl+0x1910/0x1910 [ 298.229231] do_syscall_64+0x1b9/0x820 [ 298.233135] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.233155] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.233176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.248314] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.253352] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 298.258380] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.258404] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.258430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.258448] RIP: 0033:0x457569 [ 298.277200] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.296117] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 298.303838] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 298.311115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 03:13:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:31 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) [ 298.318397] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 298.325680] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f2403fd66d4 [ 298.332965] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 03:13:32 executing program 2 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:32 executing program 0 (fault-call:8 fault-nth:0): mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:32 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0xe7) 03:13:32 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:32 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:32 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:32 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f0000000040)) read(r0, &(0x7f0000a16000)=""/71, 0x47) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000080)="575a7985398e96b5407043b58b675822") 03:13:32 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 298.525567] FAULT_INJECTION: forcing a failure. [ 298.525567] name failslab, interval 1, probability 0, space 0, times 0 [ 298.561232] FAULT_INJECTION: forcing a failure. [ 298.561232] name failslab, interval 1, probability 0, space 0, times 0 [ 298.587856] CPU: 0 PID: 10180 Comm: syz-executor0 Not tainted 4.19.0-next-20181029+ #100 [ 298.596132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.605495] Call Trace: [ 298.605525] dump_stack+0x244/0x39d [ 298.605560] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.605646] ? _parse_integer+0x180/0x180 [ 298.605685] should_fail.cold.4+0xa/0x17 [ 298.625286] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.630403] ? zap_class+0x640/0x640 [ 298.634132] ? lock_downgrade+0x900/0x900 [ 298.638293] ? check_preemption_disabled+0x48/0x280 [ 298.643339] ? find_held_lock+0x36/0x1c0 [ 298.647445] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.652906] ? find_held_lock+0x36/0x1c0 [ 298.656987] __should_failslab+0x124/0x180 [ 298.661248] should_failslab+0x9/0x14 [ 298.665075] kmem_cache_alloc+0x2be/0x730 [ 298.669239] ? __lock_is_held+0xb5/0x140 [ 298.673403] getname_flags+0xd0/0x590 [ 298.677234] do_rmdir+0xeb/0x630 [ 298.680624] ? __ia32_sys_mkdir+0x80/0x80 [ 298.684787] ? fput+0x130/0x1a0 [ 298.688083] ? do_syscall_64+0x9a/0x820 [ 298.692079] ? do_syscall_64+0x9a/0x820 [ 298.696080] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 298.700673] ? trace_hardirqs_on+0xbd/0x310 [ 298.705019] ? __ia32_sys_read+0xb0/0xb0 [ 298.709098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.714470] ? trace_hardirqs_off_caller+0x300/0x300 [ 298.719591] __x64_sys_rmdir+0x36/0x40 [ 298.723489] do_syscall_64+0x1b9/0x820 [ 298.727387] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.732762] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.737700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.742556] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.747596] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 298.752633] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.757706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.762565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.767766] RIP: 0033:0x457569 03:13:32 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x2000, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r2 = syz_open_pts(0xffffffffffffff9c, 0x440802) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000080)=0x8) read(r1, &(0x7f0000000140)=""/71, 0x43) [ 298.770974] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.789884] RSP: 002b:00007f10c1afbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 298.797611] RAX: ffffffffffffffda RBX: 00007f10c1afbc90 RCX: 0000000000457569 [ 298.804888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 298.812171] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 298.819539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f10c1afc6d4 [ 298.826812] R13: 00000000004c350e R14: 00000000004d53c0 R15: 0000000000000006 [ 298.837100] CPU: 1 PID: 10186 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 298.845356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.854718] Call Trace: [ 298.857321] dump_stack+0x244/0x39d [ 298.860970] ? dump_stack_print_info.cold.1+0x20/0x20 [ 298.866183] should_fail.cold.4+0xa/0x17 [ 298.870258] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.875452] ? __kernel_text_address+0xd/0x40 [ 298.879968] ? unwind_get_return_address+0x61/0xa0 [ 298.884937] ? find_held_lock+0x36/0x1c0 [ 298.889038] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.894519] __should_failslab+0x124/0x180 [ 298.898776] should_failslab+0x9/0x14 [ 298.902593] kmem_cache_alloc+0x2be/0x730 [ 298.906760] ? mpol_shared_policy_init+0x235/0x650 [ 298.911711] ? current_time+0x72/0x1b0 [ 298.915616] __d_alloc+0xc8/0xb90 [ 298.919099] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 298.924135] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 298.929231] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 298.934436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.939986] ? timespec64_trunc+0xea/0x180 [ 298.944234] ? inode_init_owner+0x340/0x340 [ 298.948594] ? _raw_spin_unlock+0x2c/0x50 [ 298.952770] ? current_time+0x10b/0x1b0 [ 298.954146] FAULT_INJECTION: forcing a failure. [ 298.954146] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 298.956767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.974092] ? __lockdep_init_map+0x105/0x590 [ 298.978617] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.984168] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 298.989726] d_alloc_pseudo+0x1d/0x30 [ 298.993536] alloc_file_pseudo+0x158/0x3f0 [ 298.997789] ? alloc_file+0x4d0/0x4d0 [ 299.001600] ? usercopy_warn+0x110/0x110 [ 299.005683] __shmem_file_setup.part.50+0x110/0x2a0 [ 299.010724] shmem_file_setup+0x65/0x90 [ 299.014711] __x64_sys_memfd_create+0x2af/0x4f0 [ 299.019389] ? memfd_fcntl+0x1910/0x1910 [ 299.023467] do_syscall_64+0x1b9/0x820 [ 299.027366] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.032742] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.037676] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.042554] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.047617] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.052648] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.057680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.062547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.067741] RIP: 0033:0x457569 [ 299.070940] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:13:32 executing program 0 (fault-call:8 fault-nth:1): mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:32 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:32 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) [ 299.089878] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.097593] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 299.104870] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 299.112146] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 299.119421] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f2403fd66d4 [ 299.126699] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 299.133999] CPU: 0 PID: 10208 Comm: syz-executor0 Not tainted 4.19.0-next-20181029+ #100 [ 299.142244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.142256] Call Trace: [ 299.154241] dump_stack+0x244/0x39d [ 299.157901] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.163124] should_fail.cold.4+0xa/0x17 [ 299.167208] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.172324] ? zap_class+0x640/0x640 [ 299.176044] ? zap_class+0x640/0x640 [ 299.176079] ? mark_held_locks+0x130/0x130 [ 299.176099] ? find_held_lock+0x36/0x1c0 [ 299.176115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.176132] ? _parse_integer+0x134/0x180 [ 299.176148] ? zap_class+0x640/0x640 [ 299.176165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 299.176184] ? _kstrtoull+0x188/0x250 [ 299.188232] ? _parse_integer+0x180/0x180 [ 299.197900] ? zap_class+0x640/0x640 [ 299.210928] ? lock_release+0xa10/0xa10 [ 299.218801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.228297] ? should_fail+0x22d/0xd01 [ 299.232208] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.237330] ? zap_class+0x640/0x640 [ 299.241077] __alloc_pages_nodemask+0x34b/0xdd0 [ 299.245762] ? lock_downgrade+0x900/0x900 [ 299.249923] ? check_preemption_disabled+0x48/0x280 [ 299.254957] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 299.259996] ? find_held_lock+0x36/0x1c0 [ 299.264107] ? trace_hardirqs_off+0xb8/0x310 [ 299.268538] cache_grow_begin+0xa5/0x8c0 [ 299.272619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.278168] ? check_preemption_disabled+0x48/0x280 [ 299.283219] kmem_cache_alloc+0x66b/0x730 [ 299.287391] getname_flags+0xd0/0x590 [ 299.291209] do_rmdir+0xeb/0x630 [ 299.294600] ? __ia32_sys_mkdir+0x80/0x80 [ 299.298761] ? fput+0x130/0x1a0 [ 299.302066] ? do_syscall_64+0x9a/0x820 [ 299.306075] ? do_syscall_64+0x9a/0x820 [ 299.306100] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 299.306119] ? trace_hardirqs_on+0xbd/0x310 [ 299.306133] ? __ia32_sys_read+0xb0/0xb0 [ 299.306153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.306173] ? trace_hardirqs_off_caller+0x300/0x300 [ 299.333567] __x64_sys_rmdir+0x36/0x40 [ 299.337477] do_syscall_64+0x1b9/0x820 [ 299.341379] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.346772] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.346787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.346807] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.346824] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.346842] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.346864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.376503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.382100] RIP: 0033:0x457569 [ 299.385311] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.404216] RSP: 002b:00007f10c1afbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 299.411909] RAX: ffffffffffffffda RBX: 00007f10c1afbc90 RCX: 0000000000457569 [ 299.419169] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 299.426426] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 299.433679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f10c1afc6d4 03:13:33 executing program 2 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:33 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:33 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:33 executing program 5: r0 = timerfd_create(0xffffffffffd, 0x80000) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1, 0x8100) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000140)={0x3, [0x0, 0x0, 0x0]}) 03:13:33 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 299.440951] R13: 00000000004c350e R14: 00000000004d53c0 R15: 0000000000000006 03:13:33 executing program 0 (fault-call:8 fault-nth:2): mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:33 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:33 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:33 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:33 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 299.594778] FAULT_INJECTION: forcing a failure. [ 299.594778] name failslab, interval 1, probability 0, space 0, times 0 [ 299.596656] FAULT_INJECTION: forcing a failure. [ 299.596656] name failslab, interval 1, probability 0, space 0, times 0 03:13:33 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 299.655915] CPU: 0 PID: 10227 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 299.664201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.673571] Call Trace: [ 299.676195] dump_stack+0x244/0x39d [ 299.679846] ? dump_stack_print_info.cold.1+0x20/0x20 [ 299.685092] ? __save_stack_trace+0x8d/0xf0 [ 299.689439] should_fail.cold.4+0xa/0x17 [ 299.693516] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.698637] ? save_stack+0x43/0xd0 [ 299.702272] ? kasan_kmalloc+0xc7/0xe0 [ 299.706182] ? percpu_ref_put_many+0x11c/0x260 [ 299.710785] ? zap_class+0x640/0x640 [ 299.710808] ? find_held_lock+0x36/0x1c0 [ 299.710854] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.718625] ? lock_downgrade+0x900/0x900 [ 299.718651] __should_failslab+0x124/0x180 [ 299.718672] should_failslab+0x9/0x14 [ 299.718692] kmem_cache_alloc+0x2be/0x730 [ 299.740445] ? d_set_d_op+0x31d/0x410 [ 299.744277] __alloc_file+0xa8/0x470 [ 299.748010] ? file_free_rcu+0xd0/0xd0 [ 299.751923] ? d_instantiate+0x79/0xa0 03:13:33 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) [ 299.755830] ? lock_downgrade+0x900/0x900 [ 299.759999] ? kasan_check_read+0x11/0x20 [ 299.764162] ? do_raw_spin_unlock+0xa7/0x330 [ 299.768585] ? do_raw_spin_trylock+0x270/0x270 [ 299.773196] alloc_empty_file+0x72/0x170 [ 299.777278] alloc_file+0x5e/0x4d0 [ 299.780828] ? _raw_spin_unlock+0x2c/0x50 [ 299.784991] alloc_file_pseudo+0x261/0x3f0 [ 299.789244] ? alloc_file+0x4d0/0x4d0 [ 299.793072] ? usercopy_warn+0x110/0x110 [ 299.797164] __shmem_file_setup.part.50+0x110/0x2a0 [ 299.802212] shmem_file_setup+0x65/0x90 [ 299.806209] __x64_sys_memfd_create+0x2af/0x4f0 [ 299.810893] ? memfd_fcntl+0x1910/0x1910 [ 299.814977] do_syscall_64+0x1b9/0x820 [ 299.814996] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.815014] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.815029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.815048] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.815076] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.815095] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.815116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.824370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.824383] RIP: 0033:0x457569 [ 299.824401] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.824410] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.824425] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 299.824434] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 299.824444] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 299.824454] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f2403fd66d4 [ 299.824463] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 299.859069] CPU: 0 PID: 10230 Comm: syz-executor0 Not tainted 4.19.0-next-20181029+ #100 [ 299.881575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.881582] Call Trace: [ 299.881607] dump_stack+0x244/0x39d [ 299.881631] ? dump_stack_print_info.cold.1+0x20/0x20 03:13:33 executing program 2 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:33 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:33 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 299.881658] should_fail.cold.4+0xa/0x17 [ 299.881677] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 299.896667] ? rcu_softirq_qs+0x20/0x20 [ 299.896683] ? rcu_softirq_qs+0x20/0x20 [ 299.896697] ? unwind_dump+0x190/0x190 [ 299.896723] ? zap_class+0x640/0x640 [ 299.896741] ? __lock_is_held+0xb5/0x140 [ 299.896771] ? __lock_is_held+0xb5/0x140 [ 299.896786] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.896816] ? perf_trace_sched_process_exec+0x860/0x860 [ 299.896837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:13:33 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 299.911376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.911399] ? check_preemption_disabled+0x48/0x280 [ 299.911421] __should_failslab+0x124/0x180 [ 299.911442] should_failslab+0x9/0x14 [ 299.911458] __kmalloc+0x2e0/0x760 [ 299.911555] ? ext4_ext_remove_space+0x26f4/0x5ad0 [ 299.926021] ext4_ext_remove_space+0x26f4/0x5ad0 [ 299.926047] ? __lock_is_held+0xb5/0x140 [ 299.926149] ? ext4_es_free_extent+0x2bc/0x790 [ 299.926195] ? rcu_read_lock_sched_held+0x14f/0x180 [ 300.049749] ? ext4_ext_index_trans_blocks+0x150/0x150 [ 300.055043] ? zap_class+0x640/0x640 [ 300.055076] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.055098] ? ext4_journalled_invalidatepage+0x50/0x50 [ 300.055119] ? find_held_lock+0x36/0x1c0 [ 300.055144] ? ext4_es_remove_extent+0x147/0x4f0 [ 300.055161] ? lock_downgrade+0x900/0x900 [ 300.055177] ? ext4_es_scan+0x950/0x950 [ 300.055203] ? do_raw_write_lock+0x14f/0x310 [ 300.064359] ? do_raw_write_trylock+0x270/0x270 [ 300.064398] ? _raw_write_unlock+0x2c/0x50 [ 300.064416] ? ext4_es_remove_extent+0x14c/0x4f0 03:13:33 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) [ 300.064432] ? ext4_journal_check_start+0x18e/0x220 [ 300.064449] ? ext4_es_lookup_extent+0xdd0/0xdd0 [ 300.064472] ? down_write+0x8a/0x130 [ 300.064485] ? ext4_truncate+0xde1/0x1650 [ 300.064507] ext4_ext_truncate+0x1cc/0x220 [ 300.064527] ext4_truncate+0xe41/0x1650 [ 300.130708] ? ext4_punch_hole+0x1220/0x1220 [ 300.135136] ? ext4_evict_inode+0xa5a/0x1ad0 [ 300.139554] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 300.144502] ? __might_sleep+0x95/0x190 [ 300.148499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.154068] ? ext4_evict_inode+0x917/0x1ad0 [ 300.158502] ? ext4_journal_abort_handle.isra.5+0x260/0x260 [ 300.164246] ? __sb_start_write+0x1b2/0x370 [ 300.168591] ext4_evict_inode+0xab6/0x1ad0 [ 300.172841] ? ext4_da_write_begin+0x12c0/0x12c0 [ 300.177696] ? inode_wait_for_writeback+0x2f/0x40 [ 300.182596] ? lock_downgrade+0x900/0x900 [ 300.186768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.192328] ? __inode_wait_for_writeback+0x2cf/0x380 [ 300.197541] ? kasan_check_read+0x11/0x20 [ 300.201709] ? do_raw_spin_unlock+0xa7/0x330 [ 300.206137] ? do_raw_spin_trylock+0x270/0x270 [ 300.210745] ? ext4_da_write_begin+0x12c0/0x12c0 [ 300.215520] evict+0x4b9/0x980 [ 300.218732] ? destroy_inode+0x200/0x200 [ 300.222809] ? iput+0x66c/0xa90 [ 300.226103] ? lock_downgrade+0x900/0x900 [ 300.226129] ? kasan_check_read+0x11/0x20 [ 300.226152] ? do_raw_spin_trylock+0x270/0x270 [ 300.234450] iput+0x674/0xa90 [ 300.234470] ? inode_add_lru+0x2a0/0x2a0 [ 300.234494] ? fsnotify_destroy_marks+0x1d2/0x270 [ 300.234511] ? fsnotify_clear_marks_by_group+0x640/0x640 [ 300.234541] dentry_unlink_inode+0x461/0x5e0 [ 300.234555] ? d_delete+0xab/0x220 [ 300.234571] ? d_lru_del+0x130/0x130 [ 300.234587] ? kasan_check_read+0x11/0x20 [ 300.234600] ? do_raw_spin_lock+0x14f/0x350 [ 300.234615] ? rwlock_bug.part.2+0x90/0x90 [ 300.234630] ? dput.part.25+0x26d/0x860 [ 300.234646] ? shrink_dcache_sb+0x350/0x350 [ 300.234669] d_delete+0x1d7/0x220 [ 300.234688] vfs_rmdir+0x38b/0x470 [ 300.234706] do_rmdir+0x537/0x630 [ 300.234726] ? __ia32_sys_mkdir+0x80/0x80 [ 300.234745] ? do_syscall_64+0x9a/0x820 [ 300.234760] ? do_syscall_64+0x9a/0x820 [ 300.234780] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 300.272607] ? trace_hardirqs_on+0xbd/0x310 [ 300.272624] ? __ia32_sys_read+0xb0/0xb0 [ 300.272642] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.272667] __x64_sys_rmdir+0x36/0x40 [ 300.292950] do_syscall_64+0x1b9/0x820 [ 300.292968] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.292986] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.293002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.293029] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.358295] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.363316] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.368339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.373177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.378363] RIP: 0033:0x457569 [ 300.381544] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.400447] RSP: 002b:00007f10c1afbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 03:13:34 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:34 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 5: r0 = timerfd_create(0x20000000000002, 0x80000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xc2, 0x400) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000001c0)={0x1, 0x1, &(0x7f0000000080)=""/67, &(0x7f0000000100)=""/77, &(0x7f0000000180)=""/33, 0xf004}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @pic={0xc7, 0x7fff, 0x230b, 0x6, 0xffff, 0x6, 0x7ff, 0x800, 0x4, 0x1, 0x8000, 0x70, 0x5, 0x8, 0x9, 0x7}}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f00000003c0)=""/36) socket$vsock_stream(0x28, 0x1, 0x0) read(r0, &(0x7f0000a16000)=""/71, 0x47) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000280)=0x80000000) [ 300.408149] RAX: ffffffffffffffda RBX: 00007f10c1afbc90 RCX: 0000000000457569 [ 300.415411] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 300.422680] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 300.429988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f10c1afc6d4 [ 300.437243] R13: 00000000004c350e R14: 00000000004d53c0 R15: 0000000000000006 [ 300.447586] EXT4-fs error (device sda1): ext4_evict_inode:293: comm syz-executor0: couldn't truncate inode 16888 (err -12) 03:13:34 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 300.565567] FAULT_INJECTION: forcing a failure. [ 300.565567] name failslab, interval 1, probability 0, space 0, times 0 [ 300.640602] CPU: 1 PID: 10277 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 300.648897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.658261] Call Trace: [ 300.660880] dump_stack+0x244/0x39d [ 300.664537] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.669751] ? lock_downgrade+0x900/0x900 [ 300.673930] ? check_preemption_disabled+0x48/0x280 [ 300.678973] should_fail.cold.4+0xa/0x17 [ 300.683044] ? rcu_softirq_qs+0x20/0x20 [ 300.687042] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.692252] ? is_bpf_text_address+0xd3/0x170 [ 300.696766] ? kernel_text_address+0x79/0xf0 [ 300.701278] ? __kernel_text_address+0xd/0x40 [ 300.705796] ? unwind_get_return_address+0x61/0xa0 [ 300.710746] ? __save_stack_trace+0x8d/0xf0 [ 300.715088] ? find_held_lock+0x36/0x1c0 [ 300.715124] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 300.715146] ? perf_trace_sched_process_exec+0x860/0x860 [ 300.729506] __should_failslab+0x124/0x180 [ 300.733769] should_failslab+0x9/0x14 [ 300.737585] kmem_cache_alloc_trace+0x2d7/0x750 [ 300.742274] ? __might_sleep+0x95/0x190 [ 300.746339] apparmor_file_alloc_security+0x17b/0xac0 [ 300.751552] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 300.757109] ? apparmor_path_rename+0xcd0/0xcd0 [ 300.761794] ? rcu_read_lock_sched_held+0x14f/0x180 [ 300.766817] ? kmem_cache_alloc+0x33a/0x730 [ 300.766833] ? d_set_d_op+0x31d/0x410 [ 300.766858] security_file_alloc+0x4c/0xa0 [ 300.774973] __alloc_file+0x12a/0x470 [ 300.774991] ? file_free_rcu+0xd0/0xd0 [ 300.775008] ? d_instantiate+0x79/0xa0 [ 300.775029] ? lock_downgrade+0x900/0x900 [ 300.794977] ? kasan_check_read+0x11/0x20 [ 300.799139] ? do_raw_spin_unlock+0xa7/0x330 [ 300.803561] ? do_raw_spin_trylock+0x270/0x270 [ 300.808146] alloc_empty_file+0x72/0x170 [ 300.812197] alloc_file+0x5e/0x4d0 [ 300.815744] ? _raw_spin_unlock+0x2c/0x50 [ 300.819880] alloc_file_pseudo+0x261/0x3f0 [ 300.824106] ? alloc_file+0x4d0/0x4d0 [ 300.827903] ? usercopy_warn+0x110/0x110 [ 300.831960] __shmem_file_setup.part.50+0x110/0x2a0 [ 300.836966] shmem_file_setup+0x65/0x90 [ 300.840932] __x64_sys_memfd_create+0x2af/0x4f0 [ 300.845586] ? memfd_fcntl+0x1910/0x1910 [ 300.849647] do_syscall_64+0x1b9/0x820 [ 300.853522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.858875] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.863793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.868627] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.873631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.878632] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.883652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.888485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.893672] RIP: 0033:0x457569 [ 300.896869] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.915757] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.923451] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 300.930710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 03:13:34 executing program 2 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:34 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) signalfd(r0, &(0x7f0000000080)={0x6}, 0x8) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) bind$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x0, {0xfffffffffffff06d, 0xb6, 0x348, 0x1, 0x40}, 0x127, 0x6}, 0xe) read(r1, &(0x7f0000a16000)=""/71, 0xffffffffffffffd5) 03:13:34 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0xfffffffffffffffc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000180)='./file0/file1\x00') 03:13:34 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 300.937967] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 300.945224] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f2403fd66d4 [ 300.952476] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 03:13:34 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:34 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x44) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) [ 301.076088] FAULT_INJECTION: forcing a failure. [ 301.076088] name failslab, interval 1, probability 0, space 0, times 0 03:13:34 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="000056000100000000000000040000000000000010000500000000000000000000ffffffd7de1b2d37"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 301.164272] CPU: 1 PID: 10307 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 301.172559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.181924] Call Trace: [ 301.184537] dump_stack+0x244/0x39d [ 301.188197] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.193415] ? find_held_lock+0x36/0x1c0 [ 301.197508] should_fail.cold.4+0xa/0x17 [ 301.201592] ? find_held_lock+0x36/0x1c0 [ 301.205680] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.210823] ? lock_downgrade+0x900/0x900 [ 301.215002] ? current_time+0x72/0x1b0 [ 301.218923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.224492] ? timespec64_trunc+0xea/0x180 [ 301.228745] ? inode_init_owner+0x340/0x340 [ 301.233099] ? find_held_lock+0x36/0x1c0 [ 301.237194] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.242664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.248227] __should_failslab+0x124/0x180 [ 301.252475] should_failslab+0x9/0x14 [ 301.256286] kmem_cache_alloc+0x2be/0x730 [ 301.260445] ? do_sys_ftruncate+0x428/0x550 [ 301.264783] ? lock_downgrade+0x900/0x900 [ 301.268949] getname_flags+0xd0/0x590 [ 301.272755] ? __lock_is_held+0xb5/0x140 [ 301.276835] getname+0x19/0x20 [ 301.280040] do_sys_open+0x383/0x700 [ 301.283775] ? filp_open+0x80/0x80 [ 301.287339] ? trace_hardirqs_off_caller+0x300/0x300 [ 301.292455] ? do_sys_ftruncate+0x449/0x550 [ 301.292477] __x64_sys_open+0x7e/0xc0 [ 301.292498] do_syscall_64+0x1b9/0x820 [ 301.304492] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.309883] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.314825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.314846] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.314863] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.314882] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.314904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.314927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.344835] RIP: 0033:0x4111a1 03:13:34 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 301.348047] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 301.366974] RSP: 002b:00007f2403fd5a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 301.374705] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 301.382187] RDX: 00007f2403fd5afa RSI: 0000000000000002 RDI: 00007f2403fd5af0 [ 301.389463] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 301.396745] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 301.404025] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:35 executing program 2 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:35 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r4, 0x24a0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:35 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:35 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:35 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000040)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:35 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:35 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 301.552259] FAULT_INJECTION: forcing a failure. [ 301.552259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 301.564113] CPU: 0 PID: 10344 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 301.564125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.564131] Call Trace: [ 301.564158] dump_stack+0x244/0x39d [ 301.564186] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.564224] should_fail.cold.4+0xa/0x17 [ 301.581798] ? fault_create_debugfs_attr+0x1f0/0x1f0 03:13:35 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) [ 301.581817] ? print_usage_bug+0xc0/0xc0 [ 301.581845] ? mark_held_locks+0x130/0x130 [ 301.581861] ? zap_class+0x640/0x640 [ 301.581880] ? print_usage_bug+0xc0/0xc0 [ 301.581900] ? zap_class+0x640/0x640 [ 301.581919] ? lock_downgrade+0x900/0x900 [ 301.626435] ? check_preemption_disabled+0x48/0x280 [ 301.631489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.637037] ? should_fail+0x22d/0xd01 [ 301.640948] ? find_held_lock+0x36/0x1c0 [ 301.645023] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.650159] __alloc_pages_nodemask+0x34b/0xdd0 [ 301.654844] ? current_time+0x72/0x1b0 [ 301.658750] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 301.658766] ? inode_init_owner+0x340/0x340 [ 301.658791] ? find_held_lock+0x36/0x1c0 [ 301.658832] ? trace_hardirqs_off+0xb8/0x310 [ 301.668163] cache_grow_begin+0xa5/0x8c0 [ 301.668183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 301.668208] ? check_preemption_disabled+0x48/0x280 [ 301.668231] kmem_cache_alloc+0x66b/0x730 [ 301.695430] ? do_sys_ftruncate+0x428/0x550 03:13:35 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 301.699776] getname_flags+0xd0/0x590 [ 301.703592] ? __lock_is_held+0xb5/0x140 [ 301.707677] getname+0x19/0x20 [ 301.710888] do_sys_open+0x383/0x700 [ 301.714623] ? filp_open+0x80/0x80 [ 301.718184] ? trace_hardirqs_off_caller+0x300/0x300 [ 301.723314] ? do_sys_ftruncate+0x449/0x550 [ 301.727652] __x64_sys_open+0x7e/0xc0 [ 301.731471] do_syscall_64+0x1b9/0x820 [ 301.735374] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.740754] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.745694] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:13:35 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 301.750556] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.755591] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.760620] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.765654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.770519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.775720] RIP: 0033:0x4111a1 [ 301.775737] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:13:35 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:35 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x100000000000000, 0xfffffffffffffffd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000010000000092dd18ab6d5e75153b25ed466a7e2a7300000004001b00000000001000040000dd840020000000000000009d5496dd8c721e87ae7c"], 0x24, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x7c, 0x101}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r3, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000300)={0x800, 0x9, 0x1, 0x7, 0xb35}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 301.775746] RSP: 002b:00007f2403fd5a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 301.775762] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 301.775773] RDX: 00007f2403fd5afa RSI: 0000000000000002 RDI: 00007f2403fd5af0 [ 301.775782] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 301.775792] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 301.775800] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 301.862679] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:35 executing program 2 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:35 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:35 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:35 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x74842, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 302.099325] FAULT_INJECTION: forcing a failure. [ 302.099325] name failslab, interval 1, probability 0, space 0, times 0 [ 302.112490] CPU: 0 PID: 10386 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 302.120744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.130112] Call Trace: [ 302.132710] dump_stack+0x244/0x39d [ 302.136338] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.141525] ? print_usage_bug+0xc0/0xc0 [ 302.145588] should_fail.cold.4+0xa/0x17 [ 302.149649] ? find_held_lock+0x36/0x1c0 [ 302.153704] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.158800] ? lock_downgrade+0x900/0x900 [ 302.162937] ? check_preemption_disabled+0x48/0x280 [ 302.167951] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 302.172876] ? kasan_check_read+0x11/0x20 [ 302.177038] ? find_held_lock+0x36/0x1c0 [ 302.181145] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.186603] __should_failslab+0x124/0x180 [ 302.190838] should_failslab+0x9/0x14 [ 302.194631] kmem_cache_alloc+0x2be/0x730 [ 302.198768] ? zap_class+0x640/0x640 [ 302.202474] ? print_usage_bug+0xc0/0xc0 [ 302.206526] ? mark_held_locks+0x130/0x130 [ 302.210755] __alloc_file+0xa8/0x470 [ 302.214457] ? file_free_rcu+0xd0/0xd0 [ 302.218335] ? find_held_lock+0x36/0x1c0 [ 302.222409] ? is_bpf_text_address+0xac/0x170 [ 302.226914] ? lock_downgrade+0x900/0x900 [ 302.231066] ? check_preemption_disabled+0x48/0x280 [ 302.236110] alloc_empty_file+0x72/0x170 [ 302.240179] path_openat+0x170/0x5150 [ 302.244002] ? rcu_softirq_qs+0x20/0x20 [ 302.247974] ? unwind_dump+0x190/0x190 [ 302.251873] ? zap_class+0x640/0x640 [ 302.255617] ? path_lookupat.isra.43+0xc00/0xc00 [ 302.260370] ? unwind_get_return_address+0x61/0xa0 [ 302.265304] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 302.270312] ? expand_files.part.8+0x571/0x9a0 [ 302.274891] ? find_held_lock+0x36/0x1c0 [ 302.278948] ? __alloc_fd+0x347/0x6e0 [ 302.282748] ? lock_downgrade+0x900/0x900 [ 302.286905] ? getname+0x19/0x20 [ 302.290276] ? kasan_check_read+0x11/0x20 [ 302.294413] ? do_raw_spin_unlock+0xa7/0x330 [ 302.298813] ? do_raw_spin_trylock+0x270/0x270 [ 302.303383] ? __lock_is_held+0xb5/0x140 [ 302.307429] ? __check_object_size+0xb1/0x782 [ 302.311919] ? _raw_spin_unlock+0x2c/0x50 [ 302.316065] ? __alloc_fd+0x347/0x6e0 [ 302.319863] do_filp_open+0x255/0x380 [ 302.323653] ? may_open_dev+0x100/0x100 [ 302.327621] ? get_unused_fd_flags+0x122/0x1a0 [ 302.332208] ? __alloc_fd+0x6e0/0x6e0 [ 302.336015] ? __lock_is_held+0xb5/0x140 [ 302.340101] do_sys_open+0x568/0x700 [ 302.343831] ? filp_open+0x80/0x80 [ 302.347383] ? trace_hardirqs_off_caller+0x300/0x300 [ 302.352488] ? do_sys_ftruncate+0x449/0x550 [ 302.356801] __x64_sys_open+0x7e/0xc0 [ 302.360596] do_syscall_64+0x1b9/0x820 [ 302.364475] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.369835] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.374754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.379589] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.384596] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.389604] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.394610] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.399455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.404634] RIP: 0033:0x4111a1 [ 302.407816] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 302.426711] RSP: 002b:00007f2403fd5a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 302.434408] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 302.441666] RDX: 00007f2403fd5afa RSI: 0000000000000002 RDI: 00007f2403fd5af0 03:13:36 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) fdatasync(r0) 03:13:36 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file1\x00') [ 302.448932] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 302.456205] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 302.463463] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:36 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 2 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:36 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge_slave_1\x00', 0x43732e539841671a}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = shmget$private(0x0, 0x2000, 0xfffffffffffffffe, &(0x7f0000ffb000/0x2000)=nil) io_setup(0x3ff, &(0x7f0000001800)=0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000001880)='/dev/mixer\x00', 0x800, 0x0) syz_open_dev$sndpcmp(&(0x7f0000001940)='/dev/snd/pcmC#D#p\x00', 0x6, 0x800) syz_open_dev$amidi(&(0x7f0000002bc0)='/dev/amidi#\x00', 0x1ff, 0x60000) io_submit(r5, 0x1, &(0x7f0000003d40)=[&(0x7f0000003d00)={0x0, 0x0, 0x0, 0x0, 0x400, r3, &(0x7f0000002d00)="e22cb431400f68fabdc20518c128dcc88fa333cd78554e8e203edfa4a27059f87ca0b85edc76ee2a85e73a75e5aa8fa19ec43749a7c53c6b262d4ebb78ce7fb3a7cc05a81dbcd47d52dd15f82c4d31ed4b3052de70e709ce02dc1ad87342ac3ee456d2d9010f459c2a8e8b4c15be90f0fb0d8af041bd7a0aad5423514b0bf945ddd21cbd1e456864c7a0bc129b3a58c81cd7cb6f8aa5d07fcb8babaa65a57dec2a2f728c97e5536a623c1d72384c072bdf0235b28f90f0cc9d07a94d85b13ad53dea4ec1d8b0c8d28317ae877263e561ae9fb4c1f5064bb66e6a9469675dbcef441fe499a5b5e8cc1bd20142db16ef14c32fb0c6b46c6a81dbfdf5658eddaef4a187614925ac278dd839c527a3ac5841b84915b1ac21cd994e63cad9830ff759734711d40edcdfd18de8171bf17b2e34fc361ff83b69b85ac571aeafadef095db6288031be5b2802b47bd41f32b2df9f6e360147694cca159fca05468af24ba946a7477b07b0a277f42d85d5b33270a8cd5bea3a25f4abff064f843eaab2a7aa76bcb4c91ee1d09d1a2a6d581a5597a822e5e0e402f1f42a03aa13e1406c0a9a77c0fe146fd7587ee4122e49ff30b8ffdc27f289eb464a4ede4ba161b592ddf64f4a6e620e064705786c3820ff4c46aacc87eacb040c09fa6154239adde6157318b289b0f87dd7f147e13b35d8d18e7ef16eb02e3866a14ddd89efb6be4ddeff73e0eeb4fbf19238ec6590948b16acdbc99c133a899d2860ad9daa8ff78bb02ebb04afd047f6e1d168c12af9562fcf8e433c70a9749e99c9a6e4960701ab9c961fbdf7d15d66f11a20a6a61f19d9264664b70ff4c205c8cff5f94cd245c5a2c1cb23684157d14687d7a5e2c76e66bbda4d7974c0d0553fc3b6d3d227450c2bed4986bac7b0131f31e640c46ae93953466fad055b8f5b4cf7ca68e5e6279a093e74288efea0d66f470818a33f2f725956cbc99f6efc78a65b5bffeaa28bac6e9d56ae01f49930e275dd6a98b71f4582d804da3bb0208810f45a9cbe842cf992237de84408116d70d09b1e66bed535ae314ae4211456c9fca27df38ca0da56beb8ad64fa48148bd10389fbfb2802c579be02a8927e44ecbe304096b31545c5ebe9c6175debea526fab775c241cf3ddec5fcd70c6a4d793ad503cfc2b9257131f13ad27d6155f5c6bb49ca827721df0c060c5d084ab3ec7e8cd17160c35fcc8cec8cec60035a0e992a009bb21f07e9d075a0be1d51462246b95eaa27e65d765c02f225e4e839caf27ccabcdeec4a373412724687ef530696ee4a395f07159f2970a6ef0dec4b7b85d00739f881898063977747670f74b6aeb0e110d5e2d317a1ba0fe1244a61f9ef09a89e0d49dd5fb553cf840e926e9442fe9c461a9426ac7f0f994b8a35991f0252b1fc8f4d9dac3a1b4095ecc46fa0597747bae00a72be0d026f149f990ebae48e1b4ab3d8cd192559ae0a0ede58e5edab04f2b5cb0badfbcc908700aa1848cf2369d79b7b3628b70b771b1e261f7f34cd1ff9bf60103085005115721bf22ae84f53277310363e59111815e560f7c00a9483e8b5ee5bffcf03340b4847f9dd100d433a8aa974ca9a49764e1008ad2c949403eb34b197b2fccc35fbab21c0b44f6d357159cd495a6f4036b9308c2213579cdb141d5f06f3f0a60e51b3adc5c22838e8b49b40a4b8039fbc17ee4a1c9808853fabf72cdde3ac8059addb7c7c992f1c3b4f3d4cc94ec55691a73d215fc5f61a66e5c081aaa00e99fc2b2079a390876152988cc927cbd0d5fa79a1433b5dee8f09405ae1c73e30116dd975d6c1d694d9f8c1eed2f1985369cf091b7f509920aa3e09f4dc839402fab49e194871571d4b71ae7e37bf63db7c0a344202a2995804cd25bfee3acf4afeda0b5baf3ce68c4e8f0655acb37b2399be9336b77881f5002e8be180c59219e3f757ba66a9b4e04334339b361ab39baf2dcd332c96c5c01416be6beef5d37926baec2cdeadc4274c19c62d03ef6678e9a33265f89afb89432d082a7f3e8b4b9a12b42a8671f8cea1576d9b3f3e0309fcf3169c779a344f09ba5977fb1d2194807c2c1b3858b5c21910e1bb0f06be595d3e66ff11aec3527dc653259ac32551b78c868f66fc5232b0d745d20ac8eec280d0741a73803a7ed19aa1afa258513c77c4f865ecbeb12de5b901c1d4623ac5a768c4d8fa8d708785eadea4c1faa352534af3438d794fa2c9484b53d22c48e7c28ec32077dcc455a9819c32a4d42e6364c78479db21b4fc1a014c735d8a64ea9b94b6dfcb4f966dc3f97f00c85ac08d92be4e2c45726d00105ad264ae99fafbc7edf636135c975fe535f9fea6e406702c363e674b7555e929eba229a207bcdef031c9123c5de2914735d9364d347476da0f155e6813734adc7a902860bd879c53a0081512568c9d428a1d4be73efd164e084b5e9654aa41823434f2fcb5a77b0ade9c34c864ed49d5f445a352b2037a8f58d988cfd5ee2087ff20207ee522659870bd02b17a53ff1dd4e494d90eb984d0e29421e035b863678635f2445a6bf0f89fb3427284c7365d91a02e9fb81ebb2f5534314593bc8cc2c5282b7e10cff9e3fa8824a3436f6a19bf08dcfe723ae2e3fdaf4cc4185425b8421e556a60b5045dee68c7a5290033f55a5c3e4a8bba8648651a8d9191e4605695d8420260ae2a4c9bc9cd8cee93074e2a4fbef842acf5b056073ea77a69d2d193b421ae0abf827a60783119e4cd6ab65fab90546152bbb8fb9d685f22da21204d9b75f9c8680e356d35ccc6ea188369685c10ee02d76b93bb6a6ecec746cfd1862553569acaac340b3b67f55c14be58409023f8c03ede25f6fb6ae29c9c3963ac215992c93aed1dc1ced213cb5f314d9019af5efa30bc884cab4384aa4905467b6023c2ec18b687e77f0bbc1474b22db0fe310f75eeec7d14bafb9b2846e0474f5cbf254e116bf9865455e008e62a5325fab2ee936287866a79ef10f57620315f811395ed44cbb3581812dd0e8735c059e1b0bdcb9d3cd9564445865656f5ed071c3090755161ef1d3e051b12297a5b353a9a4ca5b2f1753fef4746cc816c5f897e11eb313a7f7483867f1b6bc013647dd65905dc6e1449feda5362ded0d76bf2d2f91ac95bee406fcb58b7e580ae1a9f5e53c0ba45facc73997b4f23fa28de4bcd0abae8feaf5989f18dcb56272bf5cb74cc376d0af6d2627286dd4b454e9a0a7a323bb59f2f0fff0937b8c53de36f3ce27e9e073004ec231026e597163babddb88a5cd696946c8061cdaa01379b8f63c75762cff256bec3460550566606e652b3fae6a6e0e9cb0949735088722cd49cf2af6138c8a0c4d31f242bce397e19734669a80108faf8337d2b5974f4840525f46a224f6215ae4779f8588561febc064c260b19bc85cc8c98c6ca4d9cb4979d25bbf8af3070c7235e8398c7aeec3f7360a8bb0cafa6fbfd54829ab6369b1b58567c9416241e6d13c05a977f91886582c330b9bad0cbf2b2b68f8c7312d631c8311d84d55fa4535afd6cfaac55e733f2e160c47ee4929686411659d23b38532dfac54d57debf0550c898f8353908cfa9fd22d6e6ef75575aa38c6baab5fb9e359adea38e61582aad67586a92f65e30faa2dc36f615756221ffe7010e1a7fa3f7fea68d34422a4fd6ff2094e0c10911b4b72de23d6c3651fa2b3b617504ce478686bcbb257516d0c6642c0ffcb1e5d905e685689c15e66283a532ef8b0f770e33129563d8cd8147a37701d5a27a3b0f6559c7463b05ea0d1d53261ccd478fbfba375babea06299a777833ff112dd403e45c5b0a0a1b2a071b893e9c8ef1f2022a264f4c1d84261175ec758800d667faac7bec69e8d1d76685369d591ea561d2474380fc46f7aa1247083cd5d3690fdd4e08c192d6474eb18160188f1416a12c7e9d2e16877069d275dd87e2eb4e9ac1d14fe60677c743328bdfd404c848ad769602f2ff350b397421ae066b4c8221fe713eb597ff6cb1b7f6061f4deb4100ed8f5e73868cf0d1e90bad3f1b0b36f8cb7102a98f7bd39bb43154ba86bc0cc6d48680ee8afd244e98c4710886a6b3aec8b1c8b2625a548515d9fe2cf14dd02112bb74748ca8a1020982aa9ac9f5b6ab54b6bd7f7c0a6d2a11a96111030d3e09aed6ccbc974881c4ad4322b37c82c43de263a52e028cd3d122e3fad8cc614e0260f693bd83c2aaeffd263fb50cc5fd1b755893de5045188c698ea145ea7c94eb9def169e3bcbfe802ee08d8f22cb1d51682e7d4e9ab8ccb436bb0dd28a728800ad0309f170c3570e62100508d02e0046148d27482ab62e6c6726f8683e197659e3285de40c2a963466f2d66743a640be2049d6bcbdc0010dfc2aa12a897e12b3ea2f9eb39af7a3b01cb562f0bba3d28503cef022e27b1f87683a21f71156438a16c63650015e2ad8fc7cda5cffcfc4cc70c1b957d57a727b994c50eca34ca251e463907c30d3a27f227d3268bfe79c012bc587ab6a921e13340979bb98e4755aa3436d3aa3be24bd0110d9f5f1d4165fbe55f4bee9f37ee3bed88e942881411bb46910504377a3a49797100ad58e471708477c0c59a9a91d7392592f400c3cfb5e97fdf7a71dd6502fd08076e864b7a440e7b66cd941b5fb9d7216aa4c7a5acd1baf8a1938a0d2673bbeeefce3b8469bf4f95e040b9bed5e29fb5ea187d22012704acc7355beec3fd243ac8079148171066f04b7ccedf1fcc99d903f85e908230563cad303a57a1354f467870de28df001f2f12199d23665417ccde214d244ff0390ed06aa52d4e1fd45b214e25fe1156b66ac3cd7c8a15d64cc40ef15486d3b6273c4a89ce0b3f6ad3752cc29256e90c31329287bad856a75289c8043f0f879908a391e286b64071ed14884c6cfdd30dba5fcecb68759e8ee55db60b20eaaead63f448fac0e4217b83fd1154aec2019dd7d1b72ba980cb98e95b40148a5af69c28ccc08b4fabbb2a01e2d2324f6a791b20c1769f21447f80990f19384266e567b1d944da56b06634ec035832d10a84d20b0cd8ca60c72054b2687bb6e31cab78288b6e1d6b68bea7469a05b6774eda56b14192cc87e3b55ce838996fd1df01f601cfd4083cb6e20ed471cc2fa934a705172b2658bd069a0ce52c6f1f995e32af30be461e4e0e098755675ae101518697c2ad917bcd8cf3c18f5adf03e68b9d43db94ab8576dfd08503b23949565f69d75393082789dfea0115e61dc4a4bd958b061d6c4101f6da21fe82958242685fc4880ad2b9947f2dc3140c859db0a59f4070205fe4ae1504665c8a2cb2076db2bbc9f972a0a2e89db64192c8451ed4e048d6de95c565d173f36c0fe63e8d4a6db2f5a2826aac30defcc19d9c6079a515ad51f46cb2826c14908e386f3779a761cbc7fcc8e41144eb54bdd545e146e3c5cb64111110459b1099c5b215d39b548c30f0e95008b7fc3ff8cdd88e067a4603c3d590bc03aaede6b365efa61fba4b241071689c68239c70ba2f3e1693d5550561fdb9beb065e37955fbd5fbaaa4021d814511fe00dd24f1a93c3f80d70302798b448ae3ec6a908917fc5762714bfd9c03342710796596ab6a5e07ab98d9d88fbf1400c3437e2a143a488e56fcec83bdb4ba18360965674af1eedda3e2a6925898d3587478e6e39e011f355bab9cc1fc55aa33eddb6ec3eb502b6a7c8039db23daf8138240ace152712b6e555b9c07e0127b69654f9ebb79c67c3414264d15e4755687850921eda2cb104aea095e4db3d00c1fc0d42721fbf9ed45448f222855c5bf10f689c833c06f52", 0x1000, 0x2, 0x0, 0x2, r1}]) shmctl$IPC_STAT(r4, 0x2, &(0x7f0000000080)=""/19) r6 = socket$inet(0x2, 0x3, 0x2) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f00000013c0)={0x0, 0xa, "f38f01926be82b472f10"}, &(0x7f0000001400)=0x12) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000001440)={0x5, 0x200, 0x2, 0x8, r8}, 0x10) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000001640)={[0x401, 0x6, 0xffffffff00000000, 0x6, 0x9, 0x9d44, 0x800, 0x0, 0x8, 0x7, 0x7, 0x3, 0x100000000, 0x1, 0xb6c, 0x3], 0x10000, 0x6000}) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000200)={'rose0\x00'}) delete_module(&(0x7f0000001380)='/dev/net/tun\x00', 0x0) getsockname(r7, &(0x7f0000000140)=@ipx, &(0x7f00000001c0)=0x80) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0x1000, "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"}, &(0x7f00000012c0)=0x1008) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000001300)={r9, 0x21, "6ed4e5a7df090e51d993a408fdfbe8e0af8f3b428113e355342cc0f4a58891e7bf"}, &(0x7f0000001340)=0x29) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r7, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r6, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) dup2(r2, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000014c0)='IPVS\x00') 03:13:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000240)={0x9}, 0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000001c0)=0x7, &(0x7f00000002c0)=0x4) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000006d0000040000f9000000001000f35bad6f000020000000000000001c20f34287e2a7206ed97c47e71e86b8d03897f2d3e2ca678a7b68ec66335cff6f3f824fd2b10b6e6ad302c01fa8edecf968caecb089a89654327b18c126abc1849e3e48a8463f7ffb0b6d791f9f3f0ab0638a081846271a65737042f5dc61e6130505b731133dee9a9b741e6fd767c981230159e4267e676d3f26d62ea9d5b0885d7533498c12233f8920926748da3a2dc09174fcb9f7d4eae92376d38e7d96ebf8ac1941431d137e08f6242a74ce8b42efb0cd138fab510ad85688cd1af57e30a4e90900e5bad0298af60dcba0e66d2b25effdf57bdd919070f1ecfe9d54f62866fc0371973a157bd8aafd83beba145104a4c3e998c7b4850c1755c7a248d4e8f195bebea9307173d9be44c5d1b4c6a8c38aedc5b93113d213441e93f742d86d38a0f0de5efca8d5"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)={0x4c8, 0xfffffffffffffff5, 0x8, [{{0x1, 0x0, 0x80800000, 0xcce6, 0x4, 0x100, {0x6, 0x2, 0x0, 0x2, 0x3, 0x32, 0x4, 0x3, 0x10001, 0x339, 0x3, r2, r3, 0x1a, 0x8}}, {0x3, 0x8, 0x18, 0x4, 'system.posix_acl_access\x00'}}, {{0x1, 0x2, 0x9, 0x7, 0x10000, 0xe, {0x2, 0x40, 0x5, 0x9, 0x6, 0x7f, 0xfffffffffffffe01, 0x1800000, 0xb4b7, 0x100, 0xd7a9, r2, r3, 0x5, 0x2}}, {0x6, 0x7, 0x18, 0x3, 'system.posix_acl_access\x00'}}, {{0x0, 0x0, 0x80000001, 0x10001, 0x17, 0x1000, {0x3, 0x9, 0xaa, 0xa4, 0x3, 0x80000001, 0x8, 0x3, 0xe541, 0x9, 0x9, r2, r3, 0x3, 0x81}}, {0x4, 0x400, 0xf, 0x0, "8d757365726d696d655f747970652d"}}, {{0x1, 0x3, 0x9, 0xffffffff, 0x8, 0x5a8, {0x0, 0x5, 0x4, 0x9, 0xfffffffffffffffc, 0x80000000, 0xe4fb, 0x7f, 0x0, 0x0, 0x9, r2, r3, 0xfff, 0x4e}}, {0x5, 0x4, 0x18, 0x10000, 'system.posix_acl_access\x00'}}, {{0x3, 0x2, 0x7, 0x7fffffff, 0x7, 0x3, {0x1, 0x8, 0x3ff, 0x4, 0x0, 0x40, 0xff, 0x400, 0x5, 0x2, 0x8, r2, r3, 0x7ae9, 0x8}}, {0x1, 0x7, 0x12, 0x226b, 'cpuacct.usage_sys\x00'}}, {{0x5, 0x0, 0x3, 0x100000001, 0x5, 0xffffffff, {0x4, 0x10000, 0x8, 0x3ff, 0xe2a9, 0x46c, 0x7, 0x9567, 0x5, 0x1ba, 0x4, r2, r3, 0x20, 0x6}}, {0x3, 0x100000001, 0x18, 0xd5, 'system.posix_acl_access\x00'}}, {{0x6, 0x1, 0x80, 0x5, 0x1, 0x6a, {0x6, 0x2, 0x10000, 0x7, 0xfffffffffffffaa5, 0x0, 0x5, 0x3, 0x6, 0x1, 0x2, r2, r3, 0xffff, 0x1b1}}, {0x5, 0x3, 0x7, 0x1ff, 'user$],'}}]}, 0x4c8) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000300)) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000140)={0x0, 0x116000}) 03:13:36 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 302.668448] FAULT_INJECTION: forcing a failure. [ 302.668448] name failslab, interval 1, probability 0, space 0, times 0 [ 302.743048] CPU: 1 PID: 10413 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 302.751344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.760718] Call Trace: [ 302.763331] dump_stack+0x244/0x39d [ 302.766988] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.772206] ? lock_downgrade+0x900/0x900 [ 302.776368] ? check_preemption_disabled+0x48/0x280 [ 302.781435] should_fail.cold.4+0xa/0x17 [ 302.785506] ? rcu_softirq_qs+0x20/0x20 [ 302.789496] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.794624] ? is_bpf_text_address+0xd3/0x170 [ 302.799135] ? kernel_text_address+0x79/0xf0 [ 302.803549] ? __kernel_text_address+0xd/0x40 [ 302.808048] ? unwind_get_return_address+0x61/0xa0 [ 302.812998] ? __save_stack_trace+0x8d/0xf0 [ 302.817337] ? find_held_lock+0x36/0x1c0 [ 302.821425] ? do_syscall_64+0x1b9/0x820 [ 302.825489] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.830954] __should_failslab+0x124/0x180 [ 302.835198] should_failslab+0x9/0x14 [ 302.839004] kmem_cache_alloc_trace+0x2d7/0x750 [ 302.843681] ? __might_sleep+0x95/0x190 [ 302.847674] apparmor_file_alloc_security+0x17b/0xac0 [ 302.852875] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 302.858421] ? apparmor_path_rename+0xcd0/0xcd0 [ 302.863107] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.868131] ? kmem_cache_alloc+0x33a/0x730 [ 302.872458] ? zap_class+0x640/0x640 [ 302.876195] security_file_alloc+0x4c/0xa0 [ 302.880438] __alloc_file+0x12a/0x470 [ 302.884243] ? file_free_rcu+0xd0/0xd0 [ 302.888137] ? find_held_lock+0x36/0x1c0 [ 302.892214] ? is_bpf_text_address+0xac/0x170 [ 302.896723] ? lock_downgrade+0x900/0x900 [ 302.900877] ? check_preemption_disabled+0x48/0x280 [ 302.905906] alloc_empty_file+0x72/0x170 [ 302.909976] path_openat+0x170/0x5150 [ 302.913779] ? rcu_softirq_qs+0x20/0x20 [ 302.917753] ? unwind_dump+0x190/0x190 [ 302.921651] ? zap_class+0x640/0x640 [ 302.925372] ? path_lookupat.isra.43+0xc00/0xc00 [ 302.930143] ? unwind_get_return_address+0x61/0xa0 [ 302.935087] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 302.940111] ? expand_files.part.8+0x571/0x9a0 [ 302.944708] ? find_held_lock+0x36/0x1c0 [ 302.948784] ? __alloc_fd+0x347/0x6e0 [ 302.952590] ? lock_downgrade+0x900/0x900 [ 302.956736] ? getname+0x19/0x20 [ 302.960121] ? kasan_check_read+0x11/0x20 [ 302.964275] ? do_raw_spin_unlock+0xa7/0x330 [ 302.968696] ? do_raw_spin_trylock+0x270/0x270 [ 302.973287] ? __lock_is_held+0xb5/0x140 [ 302.977351] ? __check_object_size+0xb1/0x782 [ 302.981858] ? _raw_spin_unlock+0x2c/0x50 [ 302.986013] ? __alloc_fd+0x347/0x6e0 [ 302.989830] do_filp_open+0x255/0x380 [ 302.993638] ? may_open_dev+0x100/0x100 [ 302.997632] ? get_unused_fd_flags+0x122/0x1a0 [ 303.002223] ? __alloc_fd+0x6e0/0x6e0 [ 303.006032] ? __lock_is_held+0xb5/0x140 [ 303.010111] do_sys_open+0x568/0x700 [ 303.013832] ? filp_open+0x80/0x80 [ 303.017381] ? trace_hardirqs_off_caller+0x300/0x300 [ 303.022488] ? do_sys_ftruncate+0x449/0x550 [ 303.026818] __x64_sys_open+0x7e/0xc0 [ 303.030631] do_syscall_64+0x1b9/0x820 [ 303.034528] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.039898] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.044835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.049682] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.054717] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.059745] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.064785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.069638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.074834] RIP: 0033:0x4111a1 03:13:36 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x4, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000003000000000000000000002000000000000000"], 0x24, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x66e00, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r3, 0x5381) r4 = add_key(&(0x7f0000000240)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000400)="8284b21843916665a6abbcae6cb8376465539d4793c498e3ec1829d7b7e41ee192f93a58a3fbeb848e52f2478b6933af49e88e0675bdbe95ab58cfa110b74bcee3ef27c909210402824a878c7d4f302b25af57d6845f8a2c3574f252487e3cc8667d7b19f15b495c893b44d5f3738198015517c05b7fce6de4b65be55db0a5ece874c6973f8cfda63ae01fea01117ebdca696f61354037d754b1ad1d9952d884c5c85f478aa0ddc240eef3fdb65a51b89cbe1984b914d2dabe9266a5bafe767095174ab08fe861faea573530ac0fe2e6af7132582460fd080d9bd453e9b0ef6501c5c20b0955ea5562fb79d94d", 0xed, 0xfffffffffffffffb) request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='system.posix_acl_access\x00', r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:36 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 303.078031] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 303.096951] RSP: 002b:00007f2403fd5a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 303.104670] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 303.111952] RDX: 00007f2403fd5afa RSI: 0000000000000002 RDI: 00007f2403fd5af0 [ 303.119222] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 303.126502] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 303.133777] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:36 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:36 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:37 executing program 2 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:37 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 303.518120] FAULT_INJECTION: forcing a failure. [ 303.518120] name failslab, interval 1, probability 0, space 0, times 0 [ 303.533710] CPU: 1 PID: 10463 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 303.541974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.551338] Call Trace: [ 303.553951] dump_stack+0x244/0x39d [ 303.557622] ? dump_stack_print_info.cold.1+0x20/0x20 [ 303.562852] should_fail.cold.4+0xa/0x17 [ 303.566933] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.572052] ? down_write_nested+0x130/0x130 [ 303.576491] ? down_read+0x120/0x120 [ 303.580221] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 303.585780] ? zap_class+0x640/0x640 [ 303.589505] ? lock_acquire+0x1ed/0x520 [ 303.593556] ? lo_ioctl+0x8e/0x1d60 [ 303.597212] ? find_held_lock+0x36/0x1c0 [ 303.601293] ? __lock_is_held+0xb5/0x140 [ 303.605383] ? perf_trace_sched_process_exec+0x860/0x860 [ 303.610863] __should_failslab+0x124/0x180 [ 303.615111] should_failslab+0x9/0x14 [ 303.618933] kmem_cache_alloc_trace+0x2d7/0x750 [ 303.623618] ? check_preemption_disabled+0x48/0x280 [ 303.628729] __kthread_create_on_node+0x137/0x540 [ 303.633593] ? loop_get_status64+0x140/0x140 [ 303.638024] ? kthread_parkme+0xb0/0xb0 [ 303.642045] ? __lockdep_init_map+0x105/0x590 [ 303.646585] ? __lockdep_init_map+0x105/0x590 [ 303.651117] ? loop_get_status64+0x140/0x140 [ 303.655548] kthread_create_on_node+0xb1/0xe0 [ 303.660070] ? __kthread_create_on_node+0x540/0x540 [ 303.665108] ? kasan_check_read+0x11/0x20 [ 303.669279] lo_ioctl+0x7f6/0x1d60 [ 303.672841] ? lo_rw_aio+0x1ef0/0x1ef0 [ 303.676804] blkdev_ioctl+0x98e/0x21b0 [ 303.680709] ? blkpg_ioctl+0xc10/0xc10 [ 303.684616] ? lock_downgrade+0x900/0x900 [ 303.684632] ? check_preemption_disabled+0x48/0x280 [ 303.684651] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 303.684668] ? kasan_check_read+0x11/0x20 [ 303.684687] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 303.698771] ? rcu_softirq_qs+0x20/0x20 [ 303.698801] ? __fget+0x4d1/0x740 [ 303.698825] ? ksys_dup3+0x680/0x680 [ 303.698854] block_ioctl+0xee/0x130 [ 303.719378] ? blkdev_fallocate+0x400/0x400 [ 303.719396] do_vfs_ioctl+0x1de/0x1790 [ 303.719420] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 303.719439] ? ioctl_preallocate+0x300/0x300 [ 303.719462] ? __fget_light+0x2e9/0x430 [ 303.736837] ? fget_raw+0x20/0x20 [ 303.736858] ? rcu_read_lock_sched_held+0x14f/0x180 [ 303.736876] ? kmem_cache_free+0x24f/0x290 [ 303.736893] ? putname+0xf7/0x130 [ 303.736912] ? do_syscall_64+0x9a/0x820 [ 303.736928] ? do_syscall_64+0x9a/0x820 03:13:37 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x80000) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0xd, 0x0, 0x1, 0x1, 0x8001, 0x9, 0x1, 0x2, 0x3ff, 0x7fff, 0x9, 0x3, 0x9e, 0xff, 0x10, 0x2c}}) timerfd_settime(r0, 0x1, &(0x7f0000000200)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x440481, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000080)={[{0x0, 0x3, 0x800, 0x81, 0x400, 0x8, 0xec, 0x6aa, 0x8, 0x40, 0x9, 0x4, 0x326}, {0x0, 0x2, 0x2, 0x8, 0x68c7, 0x1, 0x2d4, 0x7ff, 0x8, 0x6, 0x2, 0x3, 0x2}, {0x4, 0x2ef, 0xfffffffffffffffd, 0x401, 0x8, 0x40, 0x1, 0x100000000, 0x55b0, 0x1ff, 0x4, 0x4, 0x80000000}], 0x6}) 03:13:37 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fchown(r3, r1, r2) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x8, &(0x7f0000002600)=[{&(0x7f00000002c0)="26162187bc81825637bf57901d849ca0704fd1caf70fa81931d6c7f1901c5a23a499de11cc15beb9179803e6906f6d93a90c3324e6c0745c818dc5019966d8fbe8372361ea9d", 0x46, 0xfffffffffffffff8}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="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", 0x1000, 0x351}, {&(0x7f0000000240)="5b17036333decc7eda83b1c646f3e8b9fcea639e55571e0ba990cf53aec743dd267e898ca1079e0246cdf1c02932082a5901", 0x32, 0x51}, {&(0x7f0000000340)="0ef91839c2a52a816b95563448d1bb508e6fa0f9e88aca62dcd9eb3f41938d3c2a79357a6bbb0ee3e6fbb0dd9e35118af02f5b0378122fc6acdc217d001385c4b1a82c4533d922adcc199502b6f62af88eaeb0ece1217d83720828b1c2cc6ce4e992b23b9acfe9c589411f8449d4f18943a42cb42eca366662", 0x79, 0x7}, {&(0x7f0000002400)="74c4472204483f3f1acedae8955280b9aa6381c5542585ae490c5d88ed19a5dc79bc3f1273e69aeaeaab971ed783e2b137accc6da5e724a0740a20b76ec2f299a6df94acb1da868e3b8b3bc1d700e5a8", 0x50, 0x9}, {&(0x7f0000002480)="55a356ee5ca83cca2c63498c4a917aee532b5bc6f658787bc663c4e56d74f94a1ed480239bd63068e5855ec46a2714ed3b510acce4853f3fdc6c92388ede9e0e279ac84d7e6a8d8a01e62adf5f0230151c35668f59467d5bc916c6a803b40afa9f0f5abc7d2a483b2cb8f6d337c2b53631c839cdf1508df8e2161d0f27becc87a2f9e5c7482fbeb57ff2291ff6792624523e7739a4cd090deb4846445153456d209093763861a0af8a677c3b518d1f8d27d8c7513c4ecccdd4efc420ed9d32b82ff8513402", 0xc5, 0x407}, {&(0x7f0000002580)="9ed2248b47b65a8fc78fa2a7d7d61b7ec913634e0a180241c2ddb035925f2c8f1d1db10db59dc566136395124ede58197075be3588245c51be34f555928977b8a29e7bbaac928805dcc2571bc8b62f368f16418f0d262feaebf14669605bfc9864f1934b956a5671", 0x68, 0x73b6}], 0x10000, &(0x7f00000026c0)={[{@mode={'mode', 0x3d, 0x1}}, {@check_strict='check=strict'}, {@map_acorn='map=acorn'}], [{@obj_user={'obj_user', 0x3d, '*}$wlan1^'}}, {@uid_eq={'uid', 0x3d, r1}}]}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010000000000003ef29b1300000000000010000400"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') setsockopt$sock_int(r4, 0x1, 0x27, &(0x7f0000000100)=0x1ed1, 0x4) 03:13:37 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 5: r0 = semget(0x0, 0x3, 0x0) semctl$GETZCNT(r0, 0x0, 0xf, &(0x7f0000000040)=""/4096) r1 = timerfd_create(0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001100)='sessionid\x00') ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000001140)=""/190) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000001200)) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000001040)='/dev/md0\x00', 0x8081, 0x0) r4 = syz_open_dev$adsp(&(0x7f0000001080)='/dev/adsp#\x00', 0x1, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r4) clock_gettime(0x0, &(0x7f00000010c0)) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r1, &(0x7f0000a16000)=""/71, 0x47) 03:13:37 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 303.736946] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 303.736968] ? security_file_ioctl+0x94/0xc0 [ 303.778391] ksys_ioctl+0xa9/0xd0 [ 303.781862] __x64_sys_ioctl+0x73/0xb0 [ 303.785772] do_syscall_64+0x1b9/0x820 [ 303.789673] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.795076] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.800030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.804904] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.809936] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.814971] ? prepare_exit_to_usermode+0x291/0x3b0 03:13:37 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 303.820008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.824873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.830084] RIP: 0033:0x4573d7 [ 303.833301] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.852205] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.852222] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 03:13:37 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 303.852231] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 303.852240] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 303.852250] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 303.852259] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:37 executing program 2 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:37 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {0x1, 0x2}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x50200, 0x0) write$binfmt_aout(r3, &(0x7f0000000400)={{0x108, 0x7, 0x5ca, 0x399, 0x33d, 0x6, 0x22a}, "a79c8c42c9204e62d96b11d683aaae9d66cae2c6005678102a8815f20a1290b2bcf766a636b71325d3e6cbbb34f49d7e3182be2f77e0b78ace47f80e77a8c451a64b49cbd285dfc752dc789b11978af12b02e6a95d4f4dd08b77f28e9d2874bc83fc566d4ab966dd83c8cbf2af266cef4c5931720395603de9e6b151c86a3fada13765f5a9a032555a9a3d09c3eae18b738737a8f627314dc50073db5d41e5e671be628b54dba361824f1c5fb2c7fe70e31ad4b84716e4", [[], [], [], [], [], [], [], [], [], []]}, 0xad7) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xac, 0x5, 0x2, 0xa20, 0x70bd25, 0x25dfdbfe, {0x1, 0x0, 0x2}, [@nested={0x18, 0x35, [@typed={0x14, 0x6c, @ipv6=@remote}]}, @nested={0x80, 0x5f, [@typed={0xc, 0x31, @u64=0x1}, @generic="ecaad84299ac2de1557f962e3b9cca207ac1d9ade5aa119b239e12d705422038d8fbb303042c490b2516165186c1df9b65b5e5669823567e31a41e7e6f8faf4a46c749d53c092319a29ad424a4134b40c00f3883dd127e9db0745d4b7e807551690864b2d0ef", @typed={0x8, 0x2a, @pid=r1}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x8004}, 0x4000) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:37 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 304.118642] FAULT_INJECTION: forcing a failure. [ 304.118642] name failslab, interval 1, probability 0, space 0, times 0 [ 304.181706] CPU: 0 PID: 10501 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 304.189993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.199355] Call Trace: [ 304.201976] dump_stack+0x244/0x39d [ 304.205629] ? dump_stack_print_info.cold.1+0x20/0x20 [ 304.210848] ? account_entity_enqueue+0x3a3/0x660 [ 304.215720] should_fail.cold.4+0xa/0x17 [ 304.219797] ? __lock_is_held+0xb5/0x140 [ 304.223867] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.229033] ? zap_class+0x640/0x640 [ 304.232766] ? print_usage_bug+0xc0/0xc0 [ 304.236849] ? find_held_lock+0x36/0x1c0 [ 304.240931] ? __lock_is_held+0xb5/0x140 [ 304.245017] ? reweight_entity+0x10f0/0x10f0 [ 304.245034] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.245073] __should_failslab+0x124/0x180 [ 304.254940] should_failslab+0x9/0x14 [ 304.254956] kmem_cache_alloc+0x2be/0x730 [ 304.254978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 304.255085] __kernfs_new_node+0x127/0x8d0 [ 304.255111] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 304.281286] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 304.286398] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 304.291520] ? zap_class+0x640/0x640 [ 304.291538] ? print_usage_bug+0xc0/0xc0 [ 304.291556] ? zap_class+0x640/0x640 [ 304.303036] ? enqueue_task_fair+0x24d/0xa50 [ 304.307475] ? find_held_lock+0x36/0x1c0 [ 304.311573] kernfs_new_node+0x95/0x120 [ 304.311597] kernfs_create_dir_ns+0x4d/0x160 [ 304.320052] internal_create_group+0x5fc/0xd80 [ 304.324689] ? remove_files.isra.1+0x190/0x190 [ 304.329278] ? up_write+0x7b/0x220 [ 304.332829] ? down_write_nested+0x130/0x130 [ 304.337247] ? down_read+0x120/0x120 [ 304.340991] sysfs_create_group+0x1f/0x30 [ 304.345156] lo_ioctl+0x1307/0x1d60 [ 304.348811] ? lo_rw_aio+0x1ef0/0x1ef0 [ 304.352714] blkdev_ioctl+0x98e/0x21b0 [ 304.356619] ? blkpg_ioctl+0xc10/0xc10 [ 304.360520] ? lock_downgrade+0x900/0x900 [ 304.360537] ? check_preemption_disabled+0x48/0x280 [ 304.360558] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 304.374636] ? kasan_check_read+0x11/0x20 03:13:37 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$security_smack_entry(r2, &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f0000000180)='system.posix_acl_access\x00', 0x18, 0x2) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:37 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:37 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) [ 304.378800] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 304.384111] ? rcu_softirq_qs+0x20/0x20 [ 304.388113] ? __fget+0x4d1/0x740 [ 304.388136] ? ksys_dup3+0x680/0x680 [ 304.395316] block_ioctl+0xee/0x130 [ 304.398958] ? blkdev_fallocate+0x400/0x400 [ 304.403304] do_vfs_ioctl+0x1de/0x1790 [ 304.407222] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 304.412782] ? ioctl_preallocate+0x300/0x300 [ 304.417211] ? __fget_light+0x2e9/0x430 [ 304.421212] ? fget_raw+0x20/0x20 [ 304.424688] ? rcu_read_lock_sched_held+0x14f/0x180 [ 304.429722] ? kmem_cache_free+0x24f/0x290 [ 304.433977] ? putname+0xf7/0x130 [ 304.437447] ? do_syscall_64+0x9a/0x820 [ 304.441433] ? do_syscall_64+0x9a/0x820 [ 304.445419] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 304.445439] ? security_file_ioctl+0x94/0xc0 [ 304.445458] ksys_ioctl+0xa9/0xd0 [ 304.445477] __x64_sys_ioctl+0x73/0xb0 [ 304.445497] do_syscall_64+0x1b9/0x820 [ 304.465706] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.471110] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.476054] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.480932] ? trace_hardirqs_on_caller+0x310/0x310 [ 304.485962] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 304.491115] ? prepare_exit_to_usermode+0x291/0x3b0 [ 304.496157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.501032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.506233] RIP: 0033:0x4573d7 [ 304.509423] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.529152] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.536884] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 304.544169] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 304.551446] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 304.558704] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 304.565960] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:38 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = dup2(r0, r0) read(r1, &(0x7f0000000040)=""/71, 0x47) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000100)) userfaultfd(0x800) 03:13:38 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:38 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 304.591186] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:38 executing program 2 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:38 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000840000000000000010000400000000002000000000000000"], 0x24, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:38 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:38 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:38 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) syz_mount_image$erofs(&(0x7f00000001c0)='erofs\x00', &(0x7f0000000240)='./file0/file1\x00', 0x3, 0x9, &(0x7f0000000680)=[{&(0x7f0000000340)="1efc1d235cfc0209c463220ef6f1dafb684ebc6298b7a2fa534d937976b4b5c38ed0a15f8fd24e", 0x27, 0x80000001}, {&(0x7f0000000380)="56755913b4378c5b4b8c7f8f09f326", 0xf, 0xfff}, {&(0x7f0000000400)="0571f6b6f885861322fab898a6037986ad6f54001025bc9e0a07a5781dd63402fe125ae9a79428ceeac357fd1ff90abf955aae605ced1422dda69de0f7d73d87bd88b4c623bc2fd1bd991a1719d2f13dd24604d4c5ee45dd2e21756460b4212aa603e0df5b041e", 0x67, 0x8}, {&(0x7f0000000480)="b20e43cc71f696c1896d752c65e6c1cbbe0ea117581d447e15802676d09ffec1cf147e2123f43059bbd354f15a28dbcb87360b96c7111e493f3dfc084b99118fcaf20b92214c0993ff6ea3c31996ea2de035fb48a637bc7437588efb80e6ef4eac2875b3b07b3f68f5705ca538a314e9800d3a00eecbde6c5e55f5e32a3c9c999539255aeb83b78e953a41a43b5a879094cd4031fd3ef29547011efed6dc756b8090667655108bb0cd9cf789df6d36750cbbf50fcfb82f", 0xb7, 0xff}, {&(0x7f0000000540)="4e2dcddadb7b8b283c53e1362fb84c71217c9c8a8f7de2c43d28ef2679e9cb4c5e11ccff23eeceb769d8204ddb6ac0b05484d3783bd36a51794cbcb241", 0x3d, 0x5}, {&(0x7f0000000580), 0x0, 0x8}, {&(0x7f00000005c0)="238e695642a820c735596be48009ce4cef69b92650f52367692e92d65b33ad618eb7e5f6dfea7734bb5917f6a3", 0x2d, 0x7fffffff}, {&(0x7f0000000600)="d36f4e648967bbdbd1a361182cc87624f9fd36461cd520911ba9016ff24ae63e45d221277f16858888", 0x29, 0x6}, {&(0x7f0000000640)="501ae725dabf32055cfb3d89f4b2a231c52e00d56d3896889f4fb27d1ef5f71a362f6f7ed626d6e589c8609dd99d95", 0x2f, 0x3f}], 0x400, &(0x7f0000000780)={[{@fault_injection={'fault_injection', 0x3d, 0x9}}, {@noacl='noacl'}], [{@euid_lt={'euid<'}}]}) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) fsetxattr$system_posix_acl(r0, &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f00000008c0)={{}, {0x1, 0x2}, [{0x2, 0x4}, {}, {}, {0x2, 0x3}, {0x2, 0x4}, {0x2, 0x4}], {0x4, 0x1}, [{0x8, 0x2}, {0x8, 0x0, r2}, {}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x3}, {0x8, 0x4}, {0x8, 0x4}], {0x10, 0x4}, {0x20, 0x7}}, 0x94, 0x1) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x7}, {0x2, 0x2}, {0x2, 0x1}, {0x2, 0x2}, {}, {0x2, 0x2}, {0x2, 0x5}, {0x2, 0x1}], {0x4, 0x6}, [{0x8, 0x5}, {0x8, 0x5}], {0x10, 0x4}, {0x20, 0x1}}, 0x74, 0x3) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:38 executing program 5: r0 = timerfd_create(0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400200, 0x100) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000180)) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000100)=""/101) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000040)) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 304.777604] FAULT_INJECTION: forcing a failure. [ 304.777604] name failslab, interval 1, probability 0, space 0, times 0 [ 304.802244] CPU: 0 PID: 10550 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 304.810509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.819880] Call Trace: [ 304.822489] dump_stack+0x244/0x39d [ 304.822524] ? dump_stack_print_info.cold.1+0x20/0x20 [ 304.831341] should_fail.cold.4+0xa/0x17 [ 304.835414] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.840525] ? pick_next_task_fair+0xa35/0x1c90 [ 304.840546] ? rcu_read_lock_sched_held+0x14f/0x180 [ 304.840573] ? zap_class+0x640/0x640 [ 304.840597] ? print_usage_bug+0xc0/0xc0 [ 304.858038] ? find_held_lock+0x36/0x1c0 [ 304.862130] ? __lock_is_held+0xb5/0x140 [ 304.866223] ? reweight_entity+0x10f0/0x10f0 [ 304.866242] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.866271] __should_failslab+0x124/0x180 [ 304.866292] should_failslab+0x9/0x14 [ 304.884171] kmem_cache_alloc+0x2be/0x730 [ 304.888347] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 304.893385] __kernfs_new_node+0x127/0x8d0 [ 304.897636] ? trace_hardirqs_off_caller+0x300/0x300 [ 304.902753] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 304.907529] ? _raw_spin_unlock_irq+0x60/0x80 [ 304.912041] ? __schedule+0x168b/0x21d0 [ 304.916037] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 304.921161] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 304.926285] ? zap_class+0x640/0x640 [ 304.930017] ? zap_class+0x640/0x640 [ 304.933758] ? enqueue_task_fair+0x24d/0xa50 [ 304.938208] ? find_held_lock+0x36/0x1c0 [ 304.942296] kernfs_new_node+0x95/0x120 [ 304.946288] kernfs_create_dir_ns+0x4d/0x160 [ 304.950710] internal_create_group+0x5fc/0xd80 [ 304.955314] ? remove_files.isra.1+0x190/0x190 [ 304.959918] ? up_write+0x7b/0x220 [ 304.963476] ? down_write_nested+0x130/0x130 [ 304.967899] ? down_read+0x120/0x120 [ 304.971645] sysfs_create_group+0x1f/0x30 03:13:38 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:38 executing program 5: r0 = timerfd_create(0x0, 0xfffffffffffffffc) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7, 0x200) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000180)=""/213) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000080)) read(r0, &(0x7f00000000c0)=""/71, 0x47) [ 304.975814] lo_ioctl+0x1307/0x1d60 [ 304.979461] ? lo_rw_aio+0x1ef0/0x1ef0 [ 304.983360] blkdev_ioctl+0x98e/0x21b0 [ 304.984877] erofs: read_super, device -> /dev/loop0 [ 304.987259] ? blkpg_ioctl+0xc10/0xc10 [ 304.987278] ? lock_downgrade+0x900/0x900 [ 304.987295] ? check_preemption_disabled+0x48/0x280 [ 304.987314] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 304.987331] ? kasan_check_read+0x11/0x20 [ 304.987352] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 305.019738] erofs: options -> fault_injection=0x0000000000000009,noacl,euid<00000000000000000000, [ 305.019881] ? rcu_softirq_qs+0x20/0x20 [ 305.032865] ? __fget+0x4d1/0x740 [ 305.036349] ? ksys_dup3+0x680/0x680 [ 305.040105] block_ioctl+0xee/0x130 [ 305.043743] ? blkdev_fallocate+0x400/0x400 [ 305.043762] do_vfs_ioctl+0x1de/0x1790 [ 305.043783] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.043803] ? ioctl_preallocate+0x300/0x300 [ 305.043820] ? __fget_light+0x2e9/0x430 [ 305.043836] ? fget_raw+0x20/0x20 [ 305.043854] ? rcu_read_lock_sched_held+0x14f/0x180 [ 305.043870] ? kmem_cache_free+0x24f/0x290 [ 305.043885] ? putname+0xf7/0x130 [ 305.043902] ? do_syscall_64+0x9a/0x820 [ 305.043922] ? do_syscall_64+0x9a/0x820 [ 305.052120] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 305.052142] ? security_file_ioctl+0x94/0xc0 [ 305.052162] ksys_ioctl+0xa9/0xd0 [ 305.052182] __x64_sys_ioctl+0x73/0xb0 [ 305.052209] do_syscall_64+0x1b9/0x820 [ 305.090786] erofs: cannot find valid erofs superblock [ 305.094761] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 305.094784] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.094800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.094821] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.094839] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 305.094858] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.094879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.094903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.094916] RIP: 0033:0x4573d7 [ 305.094934] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:13:38 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:38 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000280)={r2, &(0x7f0000000200)=""/114}) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f00000000c0)=""/71, 0x47) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0xc000) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000080)={0x7, 0x1, 0xffffffffffffff4a, 0x3}) [ 305.178034] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.185793] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 305.193088] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 305.200367] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.207646] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 305.214917] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 305.247077] erofs: read_super, device -> /dev/loop0 [ 305.252145] erofs: options -> fault_injection=0x0000000000000009,noacl,euid<00000000000000000000, [ 305.269035] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 305.286790] erofs: cannot find valid erofs superblock 03:13:39 executing program 2 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:39 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x6000, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 03:13:39 executing program 0: mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigreturn() openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180), &(0x7f0000000340)=0x4) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010000000000000004000000fbffffff10000400000000002000000000000000"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') r3 = request_key(&(0x7f00000001c0)='dns_resolver\x00', 0xffffffffffffffff, &(0x7f0000000380)='\x00', 0xffffffffffffffff) keyctl$clear(0x7, r3) 03:13:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 5: r0 = timerfd_create(0x6, 0x80004) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key(&(0x7f0000000340)="736b066c6c6172000000a7bff041d3c0e7104f391581856ebc00eeeed5ce44501aef1ed0f4d570b93abd175c88d9ef052f1dac1ff97bce60416ca01080c32da9dc2c87d87dcb69aad0e8b1a258e4639728337f32673c1a46f4a467d22d8c4704550c533272137573fea3ca46000164487c95dcc8e7519580265ab630fbfb30d03c15cb179255b929794eab8a994031145ad5f50b2919e1122caa841219096a9f575586d6d4021b5e9ee317b6a9780286e84c3b555ee2de10503b9021d8ae8d15ad64d0387e82f8d91aa3152a462b076c35f92f264ab49ac21614b20b81e03aca939fdbfd7f372c1a6be313791cdb19bcd3fffc", &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000200)="85184ba4ae994d6c388f359e56bf0bb17cdfd58c4327be8717ae3fce109ef4143a07cd9e6c26c34cc9c33a7899606570b83365b11d6ca85249fa79297285097869c5bf36e0ed188d090d", 0x4a, r2) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000000c0)='rxrpc_s\x00', 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x6, 0x7, 0x6, 0x5d, 0x1, 0x7fff}) 03:13:39 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0xfffffffffffff801, 0x4) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x5, 0x5}) [ 305.560112] FAULT_INJECTION: forcing a failure. [ 305.560112] name failslab, interval 1, probability 0, space 0, times 0 [ 305.614758] CPU: 1 PID: 10609 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 305.623044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.623052] Call Trace: [ 305.623090] dump_stack+0x244/0x39d [ 305.623118] ? dump_stack_print_info.cold.1+0x20/0x20 [ 305.623148] should_fail.cold.4+0xa/0x17 [ 305.623169] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.623191] ? lock_release+0xa10/0xa10 [ 305.623209] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.623239] ? zap_class+0x640/0x640 [ 305.643980] ? find_held_lock+0x36/0x1c0 [ 305.644003] ? __lock_is_held+0xb5/0x140 [ 305.644034] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.644054] ? kernfs_activate+0x21a/0x2c0 [ 305.684127] __should_failslab+0x124/0x180 [ 305.688385] should_failslab+0x9/0x14 [ 305.692198] kmem_cache_alloc+0x2be/0x730 [ 305.696363] ? lock_downgrade+0x900/0x900 [ 305.700523] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 305.705560] __kernfs_new_node+0x127/0x8d0 [ 305.709812] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 305.714592] ? zap_class+0x640/0x640 [ 305.718333] ? __lock_is_held+0xb5/0x140 [ 305.722412] ? wait_for_completion+0x8a0/0x8a0 [ 305.727022] ? mutex_unlock+0xd/0x10 [ 305.730766] ? kernfs_activate+0x21a/0x2c0 [ 305.735020] ? kernfs_walk_and_get_ns+0x340/0x340 [ 305.739891] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 305.745442] ? kernfs_link_sibling+0x1d2/0x3b0 [ 305.750049] kernfs_new_node+0x95/0x120 [ 305.754056] __kernfs_create_file+0x5a/0x340 [ 305.758505] sysfs_add_file_mode_ns+0x222/0x530 [ 305.763200] internal_create_group+0x3df/0xd80 [ 305.767813] ? remove_files.isra.1+0x190/0x190 [ 305.772407] ? up_write+0x7b/0x220 [ 305.775962] ? down_write_nested+0x130/0x130 [ 305.775976] ? down_read+0x120/0x120 [ 305.776008] sysfs_create_group+0x1f/0x30 [ 305.776026] lo_ioctl+0x1307/0x1d60 [ 305.776050] ? lo_rw_aio+0x1ef0/0x1ef0 [ 305.776079] blkdev_ioctl+0x98e/0x21b0 [ 305.788339] ? blkpg_ioctl+0xc10/0xc10 [ 305.788358] ? lock_downgrade+0x900/0x900 [ 305.788374] ? check_preemption_disabled+0x48/0x280 [ 305.788394] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 305.788415] ? kasan_check_read+0x11/0x20 [ 305.803671] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 305.803688] ? rcu_softirq_qs+0x20/0x20 [ 305.803721] ? __fget+0x4d1/0x740 [ 305.803743] ? ksys_dup3+0x680/0x680 [ 305.812911] block_ioctl+0xee/0x130 [ 305.812929] ? blkdev_fallocate+0x400/0x400 [ 305.812947] do_vfs_ioctl+0x1de/0x1790 [ 305.812973] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 305.812992] ? ioctl_preallocate+0x300/0x300 [ 305.813011] ? __fget_light+0x2e9/0x430 [ 305.864200] ? fget_raw+0x20/0x20 [ 305.867667] ? rcu_read_lock_sched_held+0x14f/0x180 [ 305.872708] ? kmem_cache_free+0x24f/0x290 [ 305.876956] ? putname+0xf7/0x130 [ 305.880430] ? do_syscall_64+0x9a/0x820 [ 305.884421] ? do_syscall_64+0x9a/0x820 [ 305.888413] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 305.888434] ? security_file_ioctl+0x94/0xc0 [ 305.888454] ksys_ioctl+0xa9/0xd0 [ 305.900912] __x64_sys_ioctl+0x73/0xb0 [ 305.904823] do_syscall_64+0x1b9/0x820 [ 305.908737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 03:13:39 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 305.914124] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.919080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.923940] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.928978] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 305.934016] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.939067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.943941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.949151] RIP: 0033:0x4573d7 [ 305.952364] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.971275] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.978973] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 305.986238] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 305.993510] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 306.000766] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 306.008043] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 306.032874] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:39 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2, 0x6c) write$P9_RCLUNK(r0, &(0x7f0000000240)={0x7, 0x79, 0x2}, 0x7) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x146bf38e, 0x30842) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) 03:13:39 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) lremovexattr(&(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d2e73797374656d2e70010469785f61636c5f61636365737300"]) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000001400)) rmdir(&(0x7f0000000200)='./file0/file1\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000400), 0x1000) 03:13:39 executing program 2 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:39 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) ioctl$FICLONE(r0, 0x40049409, r1) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x2400000000000000}, {0x0, 0x1c9c380}}, &(0x7f000000ffe0)) read(r0, &(0x7f0000a16000)=""/71, 0xfffffffffffffcb5) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000000c0)={0x7f, 0x81, 0xfffffffffffffffc}) [ 306.229809] FAULT_INJECTION: forcing a failure. [ 306.229809] name failslab, interval 1, probability 0, space 0, times 0 03:13:39 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f0000000180)='./file0\x00', r1, r2) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 306.285383] CPU: 1 PID: 10653 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 306.293678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.303069] Call Trace: [ 306.305707] dump_stack+0x244/0x39d [ 306.309362] ? dump_stack_print_info.cold.1+0x20/0x20 [ 306.314588] should_fail.cold.4+0xa/0x17 [ 306.318673] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 306.323807] ? lock_release+0xa10/0xa10 [ 306.327791] ? perf_trace_sched_process_exec+0x860/0x860 03:13:39 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 306.333276] ? zap_class+0x640/0x640 [ 306.337018] ? find_held_lock+0x36/0x1c0 [ 306.341118] ? __lock_is_held+0xb5/0x140 [ 306.345210] ? perf_trace_sched_process_exec+0x860/0x860 [ 306.350687] ? kernfs_activate+0x21a/0x2c0 [ 306.354997] __should_failslab+0x124/0x180 [ 306.359262] should_failslab+0x9/0x14 [ 306.363105] kmem_cache_alloc+0x2be/0x730 [ 306.367275] ? lock_downgrade+0x900/0x900 [ 306.371457] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 306.376509] __kernfs_new_node+0x127/0x8d0 [ 306.380784] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 306.385567] ? zap_class+0x640/0x640 [ 306.389320] ? __lock_is_held+0xb5/0x140 [ 306.393399] ? wait_for_completion+0x8a0/0x8a0 [ 306.398009] ? mutex_unlock+0xd/0x10 [ 306.401746] ? kernfs_activate+0x21a/0x2c0 [ 306.406000] ? kernfs_walk_and_get_ns+0x340/0x340 [ 306.410878] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 306.416437] ? kernfs_link_sibling+0x1d2/0x3b0 [ 306.421053] kernfs_new_node+0x95/0x120 [ 306.425072] __kernfs_create_file+0x5a/0x340 [ 306.429499] sysfs_add_file_mode_ns+0x222/0x530 [ 306.429531] internal_create_group+0x3df/0xd80 [ 306.438787] ? remove_files.isra.1+0x190/0x190 [ 306.438803] ? up_write+0x7b/0x220 [ 306.438820] ? down_write_nested+0x130/0x130 [ 306.438834] ? down_read+0x120/0x120 [ 306.438863] sysfs_create_group+0x1f/0x30 [ 306.446965] lo_ioctl+0x1307/0x1d60 [ 306.446992] ? lo_rw_aio+0x1ef0/0x1ef0 [ 306.447008] blkdev_ioctl+0x98e/0x21b0 [ 306.447025] ? blkpg_ioctl+0xc10/0xc10 [ 306.447047] ? lock_downgrade+0x900/0x900 [ 306.455183] ? check_preemption_disabled+0x48/0x280 [ 306.455203] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 306.455221] ? kasan_check_read+0x11/0x20 [ 306.455236] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 306.455252] ? rcu_softirq_qs+0x20/0x20 [ 306.455277] ? __fget+0x4d1/0x740 [ 306.455299] ? ksys_dup3+0x680/0x680 [ 306.455328] block_ioctl+0xee/0x130 [ 306.463090] ? blkdev_fallocate+0x400/0x400 [ 306.463109] do_vfs_ioctl+0x1de/0x1790 [ 306.463130] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 306.463149] ? ioctl_preallocate+0x300/0x300 [ 306.463166] ? __fget_light+0x2e9/0x430 [ 306.463188] ? fget_raw+0x20/0x20 [ 306.470976] ? rcu_read_lock_sched_held+0x14f/0x180 [ 306.470996] ? kmem_cache_free+0x24f/0x290 [ 306.471013] ? putname+0xf7/0x130 [ 306.471033] ? do_syscall_64+0x9a/0x820 [ 306.471049] ? do_syscall_64+0x9a/0x820 [ 306.471080] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 306.479112] ? security_file_ioctl+0x94/0xc0 [ 306.479135] ksys_ioctl+0xa9/0xd0 [ 306.479156] __x64_sys_ioctl+0x73/0xb0 [ 306.479176] do_syscall_64+0x1b9/0x820 [ 306.479197] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 306.489157] ? syscall_return_slowpath+0x5e0/0x5e0 [ 306.489174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.489194] ? trace_hardirqs_on_caller+0x310/0x310 [ 306.489212] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 306.489230] ? prepare_exit_to_usermode+0x291/0x3b0 [ 306.489252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.590056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.590086] RIP: 0033:0x4573d7 [ 306.600115] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.600125] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.600140] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 306.600155] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.664498] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 306.671774] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 306.679033] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 306.705968] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:40 executing program 2 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:40 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:40 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:40 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) syz_mount_image$erofs(&(0x7f00000001c0)='erofs\x00', &(0x7f0000000240)='./file0/file1\x00', 0x3, 0x9, &(0x7f0000000680)=[{&(0x7f0000000340)="1efc1d235cfc0209c463220ef6f1dafb684ebc6298b7a2fa534d937976b4b5c38ed0a15f8fd24e", 0x27, 0x80000001}, {&(0x7f0000000380)="56755913b4378c5b4b8c7f8f09f326", 0xf, 0xfff}, {&(0x7f0000000400)="0571f6b6f885861322fab898a6037986ad6f54001025bc9e0a07a5781dd63402fe125ae9a79428ceeac357fd1ff90abf955aae605ced1422dda69de0f7d73d87bd88b4c623bc2fd1bd991a1719d2f13dd24604d4c5ee45dd2e21756460b4212aa603e0df5b041e", 0x67, 0x8}, {&(0x7f0000000480)="b20e43cc71f696c1896d752c65e6c1cbbe0ea117581d447e15802676d09ffec1cf147e2123f43059bbd354f15a28dbcb87360b96c7111e493f3dfc084b99118fcaf20b92214c0993ff6ea3c31996ea2de035fb48a637bc7437588efb80e6ef4eac2875b3b07b3f68f5705ca538a314e9800d3a00eecbde6c5e55f5e32a3c9c999539255aeb83b78e953a41a43b5a879094cd4031fd3ef29547011efed6dc756b8090667655108bb0cd9cf789df6d36750cbbf50fcfb82f", 0xb7, 0xff}, {&(0x7f0000000540)="4e2dcddadb7b8b283c53e1362fb84c71217c9c8a8f7de2c43d28ef2679e9cb4c5e11ccff23eeceb769d8204ddb6ac0b05484d3783bd36a51794cbcb241", 0x3d, 0x5}, {&(0x7f0000000580), 0x0, 0x8}, {&(0x7f00000005c0)="238e695642a820c735596be48009ce4cef69b92650f52367692e92d65b33ad618eb7e5f6dfea7734bb5917f6a3", 0x2d, 0x7fffffff}, {&(0x7f0000000600)="d36f4e648967bbdbd1a361182cc87624f9fd36461cd520911ba9016ff24ae63e45d221277f16858888", 0x29, 0x6}, {&(0x7f0000000640)="501ae725dabf32055cfb3d89f4b2a231c52e00d56d3896889f4fb27d1ef5f71a362f6f7ed626d6e589c8609dd99d95", 0x2f, 0x3f}], 0x400, &(0x7f0000000780)={[{@fault_injection={'fault_injection', 0x3d, 0x9}}, {@noacl='noacl'}], [{@euid_lt={'euid<'}}]}) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x1) getresgid(&(0x7f0000000800), &(0x7f0000000840)=0x0, &(0x7f0000000880)) fsetxattr$system_posix_acl(r0, &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f00000008c0)={{}, {0x1, 0x2}, [{0x2, 0x4}, {}, {}, {0x2, 0x3}, {0x2, 0x4}, {0x2, 0x4}], {0x4, 0x1}, [{0x8, 0x2}, {0x8, 0x0, r2}, {}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x3}, {0x8, 0x4}, {0x8, 0x4}], {0x10, 0x4}, {0x20, 0x7}}, 0x94, 0x1) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x7}, {0x2, 0x2}, {0x2, 0x1}, {0x2, 0x2}, {}, {0x2, 0x2}, {0x2, 0x5}, {0x2, 0x1}], {0x4, 0x6}, [{0x8, 0x5}, {0x8, 0x5}], {0x10, 0x4}, {0x20, 0x1}}, 0x74, 0x3) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:40 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:40 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sysfs$2(0x2, 0x100, &(0x7f00000002c0)=""/178) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0), 0x0, 0x1}], 0x3100064, 0xffffffffffffffff) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 306.842511] erofs: read_super, device -> /dev/loop5 03:13:40 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:40 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 306.883651] erofs: options -> fault_injection=0x0000000000000009,noacl,euid<00000000000000000000, [ 306.915892] FAULT_INJECTION: forcing a failure. [ 306.915892] name failslab, interval 1, probability 0, space 0, times 0 [ 306.932577] CPU: 1 PID: 10695 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 306.940830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.950196] Call Trace: [ 306.952811] dump_stack+0x244/0x39d [ 306.956470] ? dump_stack_print_info.cold.1+0x20/0x20 [ 306.961704] should_fail.cold.4+0xa/0x17 [ 306.965821] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 306.967908] erofs: cannot find valid erofs superblock [ 306.970951] ? lock_release+0xa10/0xa10 03:13:40 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:40 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 306.970967] ? perf_trace_sched_process_exec+0x860/0x860 [ 306.970992] ? zap_class+0x640/0x640 [ 306.971017] ? find_held_lock+0x36/0x1c0 [ 306.993387] ? __lock_is_held+0xb5/0x140 [ 306.997479] ? perf_trace_sched_process_exec+0x860/0x860 [ 307.002949] ? kernfs_activate+0x21a/0x2c0 [ 307.007206] __should_failslab+0x124/0x180 [ 307.011453] should_failslab+0x9/0x14 [ 307.015271] kmem_cache_alloc+0x2be/0x730 [ 307.019432] ? lock_downgrade+0x900/0x900 [ 307.023597] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 307.028631] __kernfs_new_node+0x127/0x8d0 [ 307.032887] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 307.037658] ? zap_class+0x640/0x640 [ 307.041403] ? __lock_is_held+0xb5/0x140 [ 307.045492] ? wait_for_completion+0x8a0/0x8a0 [ 307.050117] ? mutex_unlock+0xd/0x10 [ 307.053849] ? kernfs_activate+0x21a/0x2c0 [ 307.058114] ? kernfs_walk_and_get_ns+0x340/0x340 [ 307.062976] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 307.068529] ? kernfs_link_sibling+0x1d2/0x3b0 [ 307.073132] kernfs_new_node+0x95/0x120 [ 307.077129] __kernfs_create_file+0x5a/0x340 03:13:40 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:40 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 307.081561] sysfs_add_file_mode_ns+0x222/0x530 [ 307.086265] internal_create_group+0x3df/0xd80 [ 307.090874] ? remove_files.isra.1+0x190/0x190 [ 307.095471] ? up_write+0x7b/0x220 [ 307.099026] ? down_write_nested+0x130/0x130 [ 307.103453] ? down_read+0x120/0x120 [ 307.107194] sysfs_create_group+0x1f/0x30 [ 307.111357] lo_ioctl+0x1307/0x1d60 [ 307.115008] ? lo_rw_aio+0x1ef0/0x1ef0 [ 307.118906] blkdev_ioctl+0x98e/0x21b0 [ 307.122814] ? blkpg_ioctl+0xc10/0xc10 [ 307.126726] ? lock_downgrade+0x900/0x900 [ 307.130895] ? check_preemption_disabled+0x48/0x280 [ 307.135929] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 307.135947] ? kasan_check_read+0x11/0x20 [ 307.135964] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 307.135979] ? rcu_softirq_qs+0x20/0x20 [ 307.136006] ? __fget+0x4d1/0x740 [ 307.136034] ? ksys_dup3+0x680/0x680 [ 307.145143] block_ioctl+0xee/0x130 [ 307.145162] ? blkdev_fallocate+0x400/0x400 [ 307.145179] do_vfs_ioctl+0x1de/0x1790 [ 307.145199] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 307.145218] ? ioctl_preallocate+0x300/0x300 [ 307.145234] ? __fget_light+0x2e9/0x430 [ 307.145250] ? fget_raw+0x20/0x20 [ 307.145270] ? rcu_read_lock_sched_held+0x14f/0x180 [ 307.195825] ? kmem_cache_free+0x24f/0x290 [ 307.200104] ? putname+0xf7/0x130 [ 307.203576] ? do_syscall_64+0x9a/0x820 [ 307.207567] ? do_syscall_64+0x9a/0x820 [ 307.211555] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 307.216160] ? security_file_ioctl+0x94/0xc0 [ 307.220587] ksys_ioctl+0xa9/0xd0 [ 307.224071] __x64_sys_ioctl+0x73/0xb0 [ 307.227983] do_syscall_64+0x1b9/0x820 [ 307.231884] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.237262] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.237279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.237300] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.237318] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.237336] ? prepare_exit_to_usermode+0x291/0x3b0 [ 307.237357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.247128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.247141] RIP: 0033:0x4573d7 [ 307.247157] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.247166] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.247182] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 307.247191] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.247199] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 307.247209] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 307.247217] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 307.370219] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:41 executing program 2 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:41 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) bind(r0, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x1}}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:41 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x74842, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:41 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x400) write$P9_RREADLINK(r0, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = socket(0x800014, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000010000400000001002000000000060000"], 0x24, 0x0) accept4(r0, &(0x7f00000002c0)=@ipx, &(0x7f0000000240)=0x80, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000001c0)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/49, &(0x7f0000000400)=0x31) write$P9_RMKDIR(r0, &(0x7f0000000340)={0x14, 0x49, 0x2, {0x4, 0x0, 0x2}}, 0x14) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) [ 307.636049] FAULT_INJECTION: forcing a failure. [ 307.636049] name failslab, interval 1, probability 0, space 0, times 0 03:13:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) [ 307.687808] CPU: 1 PID: 10741 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 307.696102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.705475] Call Trace: [ 307.708104] dump_stack+0x244/0x39d [ 307.711760] ? dump_stack_print_info.cold.1+0x20/0x20 [ 307.716985] should_fail.cold.4+0xa/0x17 [ 307.721083] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.726207] ? lock_release+0xa10/0xa10 [ 307.726223] ? perf_trace_sched_process_exec+0x860/0x860 03:13:41 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 307.726246] ? zap_class+0x640/0x640 [ 307.726272] ? find_held_lock+0x36/0x1c0 [ 307.743465] ? __lock_is_held+0xb5/0x140 [ 307.747554] ? perf_trace_sched_process_exec+0x860/0x860 [ 307.753025] ? kernfs_activate+0x21a/0x2c0 [ 307.757296] __should_failslab+0x124/0x180 [ 307.761552] should_failslab+0x9/0x14 [ 307.765369] kmem_cache_alloc+0x2be/0x730 [ 307.769540] ? lock_downgrade+0x900/0x900 [ 307.773715] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 307.778749] __kernfs_new_node+0x127/0x8d0 [ 307.783008] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 307.787780] ? zap_class+0x640/0x640 [ 307.791521] ? __lock_is_held+0xb5/0x140 [ 307.795603] ? wait_for_completion+0x8a0/0x8a0 [ 307.800228] ? mutex_unlock+0xd/0x10 [ 307.803970] ? kernfs_activate+0x21a/0x2c0 [ 307.808221] ? kernfs_walk_and_get_ns+0x340/0x340 [ 307.813090] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 307.818635] ? kernfs_link_sibling+0x1d2/0x3b0 [ 307.823244] kernfs_new_node+0x95/0x120 [ 307.827243] __kernfs_create_file+0x5a/0x340 [ 307.831672] sysfs_add_file_mode_ns+0x222/0x530 [ 307.836375] internal_create_group+0x3df/0xd80 [ 307.840982] ? remove_files.isra.1+0x190/0x190 [ 307.840999] ? up_write+0x7b/0x220 [ 307.841016] ? down_write_nested+0x130/0x130 [ 307.841029] ? down_read+0x120/0x120 [ 307.841056] sysfs_create_group+0x1f/0x30 [ 307.849173] lo_ioctl+0x1307/0x1d60 [ 307.849199] ? lo_rw_aio+0x1ef0/0x1ef0 [ 307.849215] blkdev_ioctl+0x98e/0x21b0 [ 307.849238] ? blkpg_ioctl+0xc10/0xc10 [ 307.876759] ? lock_downgrade+0x900/0x900 [ 307.880924] ? check_preemption_disabled+0x48/0x280 [ 307.885965] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 307.890914] ? kasan_check_read+0x11/0x20 [ 307.895086] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 307.895103] ? rcu_softirq_qs+0x20/0x20 [ 307.895129] ? __fget+0x4d1/0x740 [ 307.895151] ? ksys_dup3+0x680/0x680 [ 307.895184] block_ioctl+0xee/0x130 [ 307.915209] ? blkdev_fallocate+0x400/0x400 [ 307.919551] do_vfs_ioctl+0x1de/0x1790 [ 307.923460] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 307.929016] ? ioctl_preallocate+0x300/0x300 [ 307.933444] ? __fget_light+0x2e9/0x430 [ 307.937431] ? fget_raw+0x20/0x20 [ 307.940899] ? rcu_read_lock_sched_held+0x14f/0x180 [ 307.945929] ? kmem_cache_free+0x24f/0x290 [ 307.950176] ? putname+0xf7/0x130 [ 307.953649] ? do_syscall_64+0x9a/0x820 [ 307.957633] ? do_syscall_64+0x9a/0x820 [ 307.961622] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 307.966220] ? security_file_ioctl+0x94/0xc0 [ 307.970665] ksys_ioctl+0xa9/0xd0 [ 307.974143] __x64_sys_ioctl+0x73/0xb0 [ 307.978050] do_syscall_64+0x1b9/0x820 [ 307.981957] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.987327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.992273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.997120] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.002131] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.007143] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.012155] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.016991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.022170] RIP: 0033:0x4573d7 [ 308.025353] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.044248] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 308.051953] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 308.059217] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 308.066479] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 308.073741] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 308.081005] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:41 executing program 2 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xffffffffffffff73) mkdir(&(0x7f0000000380)='./file0/file1\x00', 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000900)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000009c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0xa000008}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x1c, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40090}, 0x4010) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x24, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xf1}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000440)={r5, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x4, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) socketpair(0x4, 0x6, 0x9, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000700), 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0/file1\x00', r7}, 0x10) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000100)={'bond_slave_0\x00', &(0x7f00000002c0)=@ethtool_rxnfc={0x2a, 0x1f, 0xba03, {0xe, @tcp_ip6_spec={@remote, @mcast2, 0x4e22, 0x4e20, 0x1f}, {"fa56", @dev={[], 0x1d}, 0x4, 0x4, [0xec3, 0x5781]}, @usr_ip6_spec={@local, @remote, 0x6, 0x2, 0xf0}, {"cb48", @random="25809bf25cda", 0x1, 0x4, [0x2, 0x6]}, 0xfffffc0000000000, 0x7}, 0x1, [0x4]}}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000740)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000840)=0xe8) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000880)={r8, 0x1, 0x4, @broadcast}, 0x0) getsockname(r3, &(0x7f0000000500)=@can={0x1d, 0x0}, &(0x7f0000000580)=0x80) sendmsg$can_bcm(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x1d, r9}, 0x10, &(0x7f0000000680)={&(0x7f0000000600)={0x4, 0x0, 0xba, {}, {0x77359400}, {0x2, 0x4, 0x69e, 0x92}, 0x1, @can={{0x3, 0x0, 0x1, 0xffffffff}, 0x5, 0x1, 0x0, 0x0, "65809300cabc0aae"}}, 0x48}, 0x1, 0x0, 0x0, 0x5}, 0x1) [ 308.101471] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:41 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x14) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000240)=0x7fff, 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9d6e, 0x30, 0x1, 0xfffffffffffffe01}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x376}, {0xa, 0x4e24, 0x7, @empty, 0xffff}, 0xfffffffffffffff9, [0x80, 0xa8, 0x5, 0x9, 0x100000001, 0x1, 0x0, 0x3c66]}, 0x5c) sendmsg$nl_generic(r2, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x14, 0x1d, 0xffffffffeffffffd, 0x0, 0x0, {0x6b}}, 0x14}}, 0x0) 03:13:41 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 308.245477] FAULT_INJECTION: forcing a failure. [ 308.245477] name failslab, interval 1, probability 0, space 0, times 0 [ 308.282294] CPU: 1 PID: 10777 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 03:13:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000100"}, &(0x7f0000000040)=0x1e) [ 308.290581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.299951] Call Trace: [ 308.302582] dump_stack+0x244/0x39d [ 308.306511] ? dump_stack_print_info.cold.1+0x20/0x20 [ 308.311741] should_fail.cold.4+0xa/0x17 [ 308.315824] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.320947] ? lock_release+0xa10/0xa10 [ 308.324932] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.330406] ? zap_class+0x640/0x640 [ 308.334156] ? find_held_lock+0x36/0x1c0 [ 308.338245] ? __lock_is_held+0xb5/0x140 [ 308.342396] ? sctp_copy_sock+0xda8/0xe30 [ 308.346584] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.352056] ? kernfs_activate+0x21a/0x2c0 [ 308.356333] __should_failslab+0x124/0x180 [ 308.360586] should_failslab+0x9/0x14 [ 308.364408] kmem_cache_alloc+0x2be/0x730 [ 308.368581] ? lock_downgrade+0x900/0x900 [ 308.372749] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 308.377784] __kernfs_new_node+0x127/0x8d0 [ 308.382041] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 308.386824] ? zap_class+0x640/0x640 [ 308.390573] ? __lock_is_held+0xb5/0x140 03:13:42 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:42 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) [ 308.394644] ? wait_for_completion+0x8a0/0x8a0 [ 308.399254] ? mutex_unlock+0xd/0x10 [ 308.402980] ? kernfs_activate+0x21a/0x2c0 [ 308.407296] ? kernfs_walk_and_get_ns+0x340/0x340 [ 308.412169] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 308.417741] ? kernfs_link_sibling+0x1d2/0x3b0 [ 308.422351] kernfs_new_node+0x95/0x120 [ 308.426355] __kernfs_create_file+0x5a/0x340 [ 308.430796] sysfs_add_file_mode_ns+0x222/0x530 [ 308.435494] internal_create_group+0x3df/0xd80 [ 308.440118] ? remove_files.isra.1+0x190/0x190 [ 308.444724] ? up_write+0x7b/0x220 [ 308.448281] ? down_write_nested+0x130/0x130 [ 308.452722] ? down_read+0x120/0x120 [ 308.456468] sysfs_create_group+0x1f/0x30 [ 308.460646] lo_ioctl+0x1307/0x1d60 [ 308.464295] ? lo_rw_aio+0x1ef0/0x1ef0 [ 308.468204] blkdev_ioctl+0x98e/0x21b0 [ 308.472113] ? blkpg_ioctl+0xc10/0xc10 [ 308.476016] ? lock_downgrade+0x900/0x900 [ 308.480205] ? check_preemption_disabled+0x48/0x280 [ 308.485266] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 308.490244] ? kasan_check_read+0x11/0x20 [ 308.494422] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 308.499727] ? rcu_softirq_qs+0x20/0x20 [ 308.503736] ? __fget+0x4d1/0x740 [ 308.503758] ? ksys_dup3+0x680/0x680 [ 308.503787] block_ioctl+0xee/0x130 [ 308.503802] ? blkdev_fallocate+0x400/0x400 [ 308.503818] do_vfs_ioctl+0x1de/0x1790 [ 308.503839] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 308.503857] ? ioctl_preallocate+0x300/0x300 [ 308.503876] ? __fget_light+0x2e9/0x430 [ 308.514714] ? fget_raw+0x20/0x20 [ 308.514736] ? rcu_read_lock_sched_held+0x14f/0x180 [ 308.514757] ? kmem_cache_free+0x24f/0x290 [ 308.522981] ? putname+0xf7/0x130 [ 308.523001] ? do_syscall_64+0x9a/0x820 [ 308.523016] ? do_syscall_64+0x9a/0x820 [ 308.523034] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 308.523070] ? security_file_ioctl+0x94/0xc0 [ 308.536990] ksys_ioctl+0xa9/0xd0 [ 308.545454] __x64_sys_ioctl+0x73/0xb0 [ 308.545473] do_syscall_64+0x1b9/0x820 [ 308.545488] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.545504] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.545519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.545540] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.553220] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.553249] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.561202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.561229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.561242] RIP: 0033:0x4573d7 [ 308.561260] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.644037] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 308.651771] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 308.659056] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 308.666349] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 308.666358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 308.666367] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 308.690733] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:42 executing program 2 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:42 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x14) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000240)=0x7fff, 0x4) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x9d6e, 0x30, 0x1, 0xfffffffffffffe01}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r1, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x376}, {0xa, 0x4e24, 0x7, @empty, 0xffff}, 0xfffffffffffffff9, [0x80, 0xa8, 0x5, 0x9, 0x100000001, 0x1, 0x0, 0x3c66]}, 0x5c) sendmsg$nl_generic(r2, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x14, 0x1d, 0xffffffffeffffffd, 0x0, 0x0, {0x6b}}, 0x14}}, 0x0) 03:13:42 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:42 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000d01"}, &(0x7f0000000040)=0x1e) 03:13:42 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt(r0, 0xfffffffffffffff8, 0x12, &(0x7f0000000540)=""/84, &(0x7f00000005c0)=0x54) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200000, 0x0) r4 = request_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='}lovboxnet1\x00', 0x0) linkat(r3, &(0x7f00000004c0)='./file0\x00', r3, &(0x7f0000000500)='./file1\x00', 0x1400) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f000025bfc8)={&(0x7f0000b9343a), 0xc, &(0x7f0000b4b000)={&(0x7f0000171fc4)=@ipv4_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0xff}, [@RTA_PRIORITY={0x8, 0x6, 0x10001}]}, 0x24}, 0x1, 0x0, 0x0, 0x4006}, 0xc0) request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000240)='keyring\x00', r4) ioctl$VIDIOC_S_JPEGCOMP(r3, 0x408c563e, &(0x7f00000002c0)={0x7, 0x5, 0x10, "0293c3dff586adf73666fbe4dda281e646297c5b294d65a154c8f13b1508fc9b7236e243bf830e5257d3e403c59ae7c42ac91f2fa90151f055d9809d", 0xb, "d7ec35ff64d5817af252d7416608d055c70b02014433605010a4fed451de837811738f4f2f85523419c59a15a98398e968cddaba1aea35d128cc001f", 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040003df959034786b69b5be5b6a2316b900000000001000"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r1, r1, &(0x7f0000000080), 0x8ab) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000480)=0x1, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000d00)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000e00)=0xe8) connect$can_bcm(r3, &(0x7f0000000e40)={0x1d, r7}, 0x10) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:42 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:42 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:42 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:42 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:42 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socket$rds(0x15, 0x5, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x90200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:42 executing program 5: lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) creat(&(0x7f00000004c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 308.903903] FAULT_INJECTION: forcing a failure. [ 308.903903] name failslab, interval 1, probability 0, space 0, times 0 [ 308.963822] CPU: 0 PID: 10818 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 308.972118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.982190] Call Trace: [ 308.984834] dump_stack+0x244/0x39d [ 308.988509] ? dump_stack_print_info.cold.1+0x20/0x20 [ 308.993743] should_fail.cold.4+0xa/0x17 [ 308.997838] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.002966] ? lock_release+0xa10/0xa10 [ 309.006956] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.012437] ? zap_class+0x640/0x640 [ 309.016175] ? find_held_lock+0x36/0x1c0 [ 309.020282] ? __lock_is_held+0xb5/0x140 [ 309.024867] ? minstrel_get_rate+0x318/0xbd0 [ 309.029311] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.034775] ? kernfs_activate+0x21a/0x2c0 [ 309.039037] __should_failslab+0x124/0x180 [ 309.043299] should_failslab+0x9/0x14 [ 309.047119] kmem_cache_alloc+0x2be/0x730 [ 309.051293] ? lock_downgrade+0x900/0x900 [ 309.055462] ? __sanitizer_cov_trace_cmp8+0x18/0x20 03:13:42 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 309.060501] __kernfs_new_node+0x127/0x8d0 [ 309.064761] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 309.069537] ? zap_class+0x640/0x640 [ 309.073284] ? __lock_is_held+0xb5/0x140 [ 309.077360] ? wait_for_completion+0x8a0/0x8a0 [ 309.081980] ? mutex_unlock+0xd/0x10 [ 309.085717] ? kernfs_activate+0x21a/0x2c0 [ 309.089973] ? kernfs_walk_and_get_ns+0x340/0x340 [ 309.094842] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 309.100393] ? kernfs_link_sibling+0x1d2/0x3b0 [ 309.104993] kernfs_new_node+0x95/0x120 [ 309.108995] __kernfs_create_file+0x5a/0x340 [ 309.113437] sysfs_add_file_mode_ns+0x222/0x530 [ 309.118133] internal_create_group+0x3df/0xd80 [ 309.122746] ? remove_files.isra.1+0x190/0x190 [ 309.127339] ? up_write+0x7b/0x220 [ 309.130895] ? down_write_nested+0x130/0x130 [ 309.135404] ? down_read+0x120/0x120 [ 309.139153] sysfs_create_group+0x1f/0x30 [ 309.143327] lo_ioctl+0x1307/0x1d60 [ 309.146977] ? lo_rw_aio+0x1ef0/0x1ef0 [ 309.150877] blkdev_ioctl+0x98e/0x21b0 [ 309.154780] ? blkpg_ioctl+0xc10/0xc10 [ 309.158684] ? lock_downgrade+0x900/0x900 [ 309.162842] ? check_preemption_disabled+0x48/0x280 [ 309.167875] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 309.172835] ? kasan_check_read+0x11/0x20 [ 309.177008] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 309.182299] ? rcu_softirq_qs+0x20/0x20 [ 309.186302] ? __fget+0x4d1/0x740 [ 309.189782] ? ksys_dup3+0x680/0x680 [ 309.193522] block_ioctl+0xee/0x130 [ 309.197161] ? blkdev_fallocate+0x400/0x400 [ 309.201505] do_vfs_ioctl+0x1de/0x1790 [ 309.205415] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 309.210977] ? ioctl_preallocate+0x300/0x300 [ 309.215399] ? __fget_light+0x2e9/0x430 [ 309.219387] ? fget_raw+0x20/0x20 [ 309.222858] ? rcu_read_lock_sched_held+0x14f/0x180 [ 309.227893] ? kmem_cache_free+0x24f/0x290 [ 309.232134] ? putname+0xf7/0x130 [ 309.236195] ? do_syscall_64+0x9a/0x820 [ 309.240222] ? do_syscall_64+0x9a/0x820 [ 309.244206] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 309.248787] ? security_file_ioctl+0x94/0xc0 [ 309.253206] ksys_ioctl+0xa9/0xd0 [ 309.256656] __x64_sys_ioctl+0x73/0xb0 [ 309.260536] do_syscall_64+0x1b9/0x820 [ 309.264424] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.269793] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.274711] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.279550] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.284558] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.289576] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.294585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.299422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.304613] RIP: 0033:0x4573d7 [ 309.307799] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.326732] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.334445] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 309.341711] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 309.348975] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 309.356273] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 309.363541] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:43 executing program 2 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:43 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r'}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@broadcast, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0/file1\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000500)=[0xee00, 0xee01, 0xffffffffffffffff]) r4 = getgid() r5 = getgid() setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x2}, [{0x2, 0x4, r0}, {0x2, 0x0, r1}, {0x2, 0x5, r2}], {0x4, 0x3}, [{0x8, 0x1, r3}, {0x8, 0x7, r4}, {0x8, 0x7, r5}], {0x10, 0x4}, {0x20, 0x2}}, 0x54, 0x3) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r7, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 5: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r4 = accept$unix(0xffffffffffffff9c, &(0x7f00000004c0)=@abs, &(0x7f00000002c0)=0x6e) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f0000000bc0)={'bridge_slave_1\x00', 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) sendto$inet(0xffffffffffffffff, &(0x7f0000000a80)="30d51a0e9549ba071c18375b8f74a7cbe51d2be292287770c885d2e4683ad9b9beb4ccb677d6fd7e544568b908ad0c46a1444fa31b89a227f80a4cc73b20a9939969573db9209e2800856cbf3d3ca3da8e912451842bef2411ac594217d72d7b24d1638bbb58a2cfaef15c5825e6403d71972ea28cb13005ceb0568e66b6278434342f335e9f68a565276fad728d36bddfe3ce4d9dee31de9c9b682c3ea7f113610a390419f185a498f19867fedbe5d3929ea068d890615d425f2a984dc6a14409fe76eae08ed5f8b37c9af2877acf5f1542232762fbbf5465c423e78c51d5e511095d6f64c05ea1", 0xe8, 0x20000000, &(0x7f0000000b80)={0x2, 0x4e21, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x13, r7, 0x0) socket$inet(0x2, 0x0, 0xa) fcntl$getownex(r5, 0x10, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000d80)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@multicast1}}, &(0x7f0000000a40)=0xe8) r9 = syz_open_dev$dspn(&(0x7f0000000ec0)='/dev/dsp#\x00', 0x10000000005, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000001e40)={'vcan0\x00', r8}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={r10, @local, @loopback}, 0xc) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000480)) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f0000000cc0)={'broute\x00', 0x0, 0x3, 0x2a, [], 0x3, &(0x7f0000000340)=[{}, {}, {}], &(0x7f0000000c80)=""/42}, &(0x7f0000000d40)=0x78) accept$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) 03:13:43 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x18200, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x40, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000240)=0x3e8cafcaff358794, 0x4) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3, r3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000010000400000000000000a756b544eedb8f9c384d634f4e421ebe2632de4a8178f04f88093a80f826c8f846c3585737a632494224f8c2fd93df6fe8b9ed0277cca74bd17635fc27ebf1fb17add947ea09f77ba2c0fee16138194c69096dfc33cd9d38c1c08c469f78342d6a1c99485cf546bf85a64c3aa75ed44139ae0951a9fabccaf32d3f6c87828ea7af849860e55cfe000aec1e62d1861fc820d94acc64b15e4b5dceeb0e10e7864823c7ebf66109fd021b3910790c17ff5d25e7264cae9aa58259aac62639dc9506db9308cd6bf7996b24d501af20af167fe3aae18e91d034b5533652acfc435c985e3152c2ac2993e43baf1ea4d42e45c6334d2a0ed0ee5dcec9018dfddecfba336cfdb6230ca703c0aec7fca4b01647a63f4f2f344845f81775d8a95b99ab26c048f9b8d67e4864019f5c202e3c83aa6a2a4d24ed13bfb01bb09078481189cf9ac4e9f4a2409567e62e4a6f8723d2c61cc9a1161788cc6f385ddbe87bae9c40c7cfc31ad50b01db0fdb91b4716c"], 0x24, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x64, r6, 0x800, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6fb0}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xe4a}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000804}, 0x0) mount(&(0x7f0000000400)=@filename='./file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='cifs\x00', 0x100880, &(0x7f00000004c0)='/dev/null\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) bind$unix(r4, &(0x7f0000000500)=@abs={0x0, 0x0, 0x4e21}, 0x6e) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:43 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 309.545168] FAULT_INJECTION: forcing a failure. [ 309.545168] name failslab, interval 1, probability 0, space 0, times 0 [ 309.556865] CPU: 0 PID: 10861 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 309.565125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.574487] Call Trace: [ 309.577104] dump_stack+0x244/0x39d [ 309.580765] ? dump_stack_print_info.cold.1+0x20/0x20 [ 309.586004] should_fail.cold.4+0xa/0x17 [ 309.590099] ? fault_create_debugfs_attr+0x1f0/0x1f0 03:13:43 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) [ 309.595225] ? lock_release+0xa10/0xa10 [ 309.599235] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.604712] ? zap_class+0x640/0x640 [ 309.608464] ? find_held_lock+0x36/0x1c0 [ 309.612547] ? __lock_is_held+0xb5/0x140 [ 309.616638] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.622107] ? kernfs_activate+0x21a/0x2c0 [ 309.626378] __should_failslab+0x124/0x180 [ 309.630631] should_failslab+0x9/0x14 [ 309.634444] kmem_cache_alloc+0x2be/0x730 [ 309.634465] ? lock_downgrade+0x900/0x900 [ 309.634485] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 309.634505] __kernfs_new_node+0x127/0x8d0 [ 309.642834] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 309.642852] ? zap_class+0x640/0x640 [ 309.642874] ? __lock_is_held+0xb5/0x140 [ 309.642890] ? wait_for_completion+0x8a0/0x8a0 [ 309.642916] ? mutex_unlock+0xd/0x10 [ 309.642936] ? kernfs_activate+0x21a/0x2c0 [ 309.677398] ? kernfs_walk_and_get_ns+0x340/0x340 [ 309.682252] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 309.687803] ? kernfs_link_sibling+0x1d2/0x3b0 [ 309.692404] kernfs_new_node+0x95/0x120 [ 309.696393] __kernfs_create_file+0x5a/0x340 [ 309.700832] sysfs_add_file_mode_ns+0x222/0x530 [ 309.705531] internal_create_group+0x3df/0xd80 [ 309.710132] ? remove_files.isra.1+0x190/0x190 [ 309.714723] ? up_write+0x7b/0x220 [ 309.718272] ? down_write_nested+0x130/0x130 [ 309.722691] ? down_read+0x120/0x120 [ 309.726449] sysfs_create_group+0x1f/0x30 [ 309.730613] lo_ioctl+0x1307/0x1d60 [ 309.734257] ? lo_rw_aio+0x1ef0/0x1ef0 [ 309.738157] blkdev_ioctl+0x98e/0x21b0 [ 309.742054] ? blkpg_ioctl+0xc10/0xc10 [ 309.745961] ? lock_downgrade+0x900/0x900 [ 309.750119] ? check_preemption_disabled+0x48/0x280 [ 309.755155] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 309.760101] ? kasan_check_read+0x11/0x20 [ 309.764257] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 309.769538] ? rcu_softirq_qs+0x20/0x20 [ 309.773531] ? __fget+0x4d1/0x740 [ 309.776996] ? ksys_dup3+0x680/0x680 [ 309.780726] block_ioctl+0xee/0x130 [ 309.784359] ? blkdev_fallocate+0x400/0x400 [ 309.788687] do_vfs_ioctl+0x1de/0x1790 [ 309.792588] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 309.798183] ? ioctl_preallocate+0x300/0x300 [ 309.802607] ? __fget_light+0x2e9/0x430 [ 309.806594] ? fget_raw+0x20/0x20 [ 309.810055] ? rcu_read_lock_sched_held+0x14f/0x180 [ 309.815098] ? kmem_cache_free+0x24f/0x290 [ 309.819340] ? putname+0xf7/0x130 [ 309.822801] ? do_syscall_64+0x9a/0x820 [ 309.826780] ? do_syscall_64+0x9a/0x820 [ 309.830762] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 309.835352] ? security_file_ioctl+0x94/0xc0 [ 309.839783] ksys_ioctl+0xa9/0xd0 [ 309.843245] __x64_sys_ioctl+0x73/0xb0 [ 309.847142] do_syscall_64+0x1b9/0x820 [ 309.851038] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.856421] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.861356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.866212] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.871235] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.876262] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.881287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.886142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.891347] RIP: 0033:0x4573d7 [ 309.894548] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.913456] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.921172] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 309.928448] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 309.935720] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 309.942990] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 309.950259] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 310.190441] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:43 executing program 2 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:43 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0200005de4d49af7ffd2f6987b441c2fc500cd00c7e698e3f41f00010000000000b40c0400faffff431322e0ec320e00"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000002c0)={0x10001, {{0xa, 0x4e21, 0x2, @empty, 0xf2}}}, 0x88) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) [ 310.296931] *** Guest State *** [ 310.308809] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 310.353191] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 310.373215] CR3 = 0x0000000000000000 [ 310.405878] RSP = 0xffffea00076bbe40 RIP = 0xffffea00076b00c0 [ 310.421413] FAULT_INJECTION: forcing a failure. [ 310.421413] name failslab, interval 1, probability 0, space 0, times 0 [ 310.433512] CPU: 1 PID: 10916 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 310.441759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.451119] Call Trace: [ 310.453734] dump_stack+0x244/0x39d [ 310.457385] ? dump_stack_print_info.cold.1+0x20/0x20 [ 310.462632] ? is_bpf_text_address+0xd3/0x170 [ 310.467148] should_fail.cold.4+0xa/0x17 [ 310.471223] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.476355] ? zap_class+0x640/0x640 [ 310.478652] RFLAGS=0xffffea00076b0102 DR7 = 0x0000000000000400 [ 310.480092] ? save_stack+0x43/0xd0 [ 310.480108] ? kasan_kmalloc+0xc7/0xe0 [ 310.480130] ? kmem_cache_alloc_trace+0x152/0x750 [ 310.499151] ? kobject_uevent_env+0x2f3/0x101e [ 310.503742] ? kobject_uevent+0x1f/0x24 [ 310.503759] ? lo_ioctl+0x1385/0x1d60 [ 310.503781] ? find_held_lock+0x36/0x1c0 [ 310.503803] ? __lock_is_held+0xb5/0x140 [ 310.520193] ? perf_trace_sched_process_exec+0x860/0x860 [ 310.525664] __should_failslab+0x124/0x180 [ 310.525685] should_failslab+0x9/0x14 [ 310.525708] __kmalloc+0x2e0/0x760 [ 310.525727] ? kobject_uevent_env+0x2f3/0x101e [ 310.532430] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 310.534112] ? rcu_read_lock_sched_held+0x14f/0x180 [ 310.534128] ? kobject_get_path+0xc2/0x1b0 [ 310.534145] ? kmem_cache_alloc_trace+0x353/0x750 [ 310.534163] kobject_get_path+0xc2/0x1b0 [ 310.534187] kobject_uevent_env+0x314/0x101e [ 310.542314] kobject_uevent+0x1f/0x24 [ 310.549610] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 310.553990] lo_ioctl+0x1385/0x1d60 [ 310.554016] ? lo_rw_aio+0x1ef0/0x1ef0 [ 310.554031] blkdev_ioctl+0x98e/0x21b0 [ 310.554052] ? blkpg_ioctl+0xc10/0xc10 [ 310.559431] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 310.563122] ? lock_downgrade+0x900/0x900 [ 310.563139] ? check_preemption_disabled+0x48/0x280 [ 310.563159] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 310.563175] ? kasan_check_read+0x11/0x20 [ 310.563194] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 310.582955] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 310.583407] ? rcu_softirq_qs+0x20/0x20 [ 310.587142] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 310.590921] ? __fget+0x4d1/0x740 [ 310.590944] ? ksys_dup3+0x680/0x680 [ 310.599324] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 310.606693] block_ioctl+0xee/0x130 [ 310.606718] ? blkdev_fallocate+0x400/0x400 [ 310.606742] do_vfs_ioctl+0x1de/0x1790 [ 310.606762] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 310.606780] ? ioctl_preallocate+0x300/0x300 [ 310.612368] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 310.615950] ? __fget_light+0x2e9/0x430 [ 310.615967] ? fget_raw+0x20/0x20 [ 310.615986] ? rcu_read_lock_sched_held+0x14f/0x180 [ 310.616003] ? kmem_cache_free+0x24f/0x290 [ 310.616023] ? putname+0xf7/0x130 [ 310.622323] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 310.625095] ? do_syscall_64+0x9a/0x820 [ 310.625110] ? do_syscall_64+0x9a/0x820 [ 310.625129] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 310.625151] ? security_file_ioctl+0x94/0xc0 [ 310.625170] ksys_ioctl+0xa9/0xd0 [ 310.630694] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 310.638420] __x64_sys_ioctl+0x73/0xb0 [ 310.638439] do_syscall_64+0x1b9/0x820 [ 310.638455] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.638472] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.638492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.645364] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 310.650448] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.650467] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.650489] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.654432] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 310.657666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.657694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.666169] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 310.669280] RIP: 0033:0x4573d7 [ 310.669298] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.669307] RSP: 002b:00007f2403fb4a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.674174] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 310.677525] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 310.677534] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 310.677543] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 310.677551] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 310.677560] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 310.896783] Interruptibility = 00000000 ActivityState = 00000000 [ 310.903876] *** Host State *** [ 310.907197] RIP = 0xffffffff8120262c RSP = 0xffff8801809af390 [ 310.913449] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 310.930504] FSBase=00007f85e4de5700 GSBase=ffff8801daf00000 TRBase=fffffe0000003000 [ 310.938843] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 310.945331] CR0=0000000080050033 CR3=00000001d1d52000 CR4=00000000001426e0 [ 310.952596] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87e01360 [ 310.959792] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 310.966432] *** Control State *** [ 310.969883] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 310.976631] EntryControls=0000d1ff ExitControls=002fefff [ 310.982093] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 310.989094] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 310.995862] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 311.002433] reason=80000021 qualification=0000000000000000 03:13:44 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000d01"}, &(0x7f0000000040)=0x1e) 03:13:44 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:44 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:44 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x400000, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f00000001c0)={0x9, 0x6, 0x4}) syz_extract_tcp_res(&(0x7f0000000240), 0x81, 0x100000001) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000100)={0x6, 0x1}) 03:13:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000200)=0xc) 03:13:44 executing program 2 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) [ 311.008824] IDTVectoring: info=00000000 errcode=00000000 [ 311.014429] TSC Offset = 0xffffff57bf95d311 [ 311.018750] EPT pointer = 0x00000001bee2301e 03:13:44 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 311.117219] FAULT_INJECTION: forcing a failure. [ 311.117219] name failslab, interval 1, probability 0, space 0, times 0 [ 311.118509] atomic_op 00000000cb11ecd0 conn xmit_atomic (null) [ 311.152982] CPU: 1 PID: 10934 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 311.161256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.170624] Call Trace: [ 311.173237] dump_stack+0x244/0x39d [ 311.176916] ? dump_stack_print_info.cold.1+0x20/0x20 [ 311.182145] should_fail.cold.4+0xa/0x17 [ 311.186221] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.191344] ? lock_release+0xa10/0xa10 [ 311.195322] ? perf_trace_sched_process_exec+0x860/0x860 [ 311.200781] ? zap_class+0x640/0x640 [ 311.204501] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 311.209535] ? find_held_lock+0x36/0x1c0 [ 311.213613] ? __lock_is_held+0xb5/0x140 [ 311.217694] ? put_dec+0x3b/0xf0 [ 311.221086] ? perf_trace_sched_process_exec+0x860/0x860 [ 311.226545] ? zap_class+0x640/0x640 [ 311.230275] __should_failslab+0x124/0x180 [ 311.234522] should_failslab+0x9/0x14 [ 311.238327] kmem_cache_alloc_node+0x26e/0x730 [ 311.242915] ? find_held_lock+0x36/0x1c0 [ 311.247080] __alloc_skb+0x114/0x770 [ 311.250818] ? netdev_alloc_frag+0x1f0/0x1f0 [ 311.255237] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 311.260171] ? kasan_check_read+0x11/0x20 [ 311.264322] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 311.269613] ? rcu_softirq_qs+0x20/0x20 [ 311.273665] ? netlink_has_listeners+0x2cb/0x4a0 [ 311.278435] ? netlink_tap_init_net+0x3d0/0x3d0 [ 311.283112] alloc_uevent_skb+0x84/0x1da [ 311.287183] kobject_uevent_env+0xa52/0x101e [ 311.291612] kobject_uevent+0x1f/0x24 [ 311.295424] lo_ioctl+0x1385/0x1d60 [ 311.299073] ? lo_rw_aio+0x1ef0/0x1ef0 [ 311.302970] blkdev_ioctl+0x98e/0x21b0 [ 311.306862] ? blkpg_ioctl+0xc10/0xc10 [ 311.310752] ? lock_downgrade+0x900/0x900 [ 311.314902] ? check_preemption_disabled+0x48/0x280 [ 311.319927] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 311.324863] ? kasan_check_read+0x11/0x20 [ 311.329015] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 311.334299] ? rcu_softirq_qs+0x20/0x20 [ 311.338294] ? __fget+0x4d1/0x740 [ 311.341756] ? ksys_dup3+0x680/0x680 [ 311.345487] block_ioctl+0xee/0x130 [ 311.349119] ? blkdev_fallocate+0x400/0x400 [ 311.353451] do_vfs_ioctl+0x1de/0x1790 [ 311.357360] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 311.362923] ? ioctl_preallocate+0x300/0x300 [ 311.367342] ? __fget_light+0x2e9/0x430 [ 311.371319] ? fget_raw+0x20/0x20 [ 311.374784] ? rcu_read_lock_sched_held+0x14f/0x180 [ 311.379808] ? kmem_cache_free+0x24f/0x290 [ 311.384241] ? putname+0xf7/0x130 [ 311.387708] ? do_syscall_64+0x9a/0x820 [ 311.391688] ? do_syscall_64+0x9a/0x820 [ 311.395693] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 311.400298] ? security_file_ioctl+0x94/0xc0 [ 311.404730] ksys_ioctl+0xa9/0xd0 [ 311.408204] __x64_sys_ioctl+0x73/0xb0 [ 311.412111] do_syscall_64+0x1b9/0x820 [ 311.416005] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.421378] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.426310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.431168] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.436199] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.441225] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.446259] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.451116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.456310] RIP: 0033:0x4573d7 [ 311.459509] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.478418] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.486136] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 311.493412] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.500686] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 311.507962] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:13:45 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9f8b, 0x400000) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000010000400001d000020000054ce000000"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chown(&(0x7f0000000300)='./file0/file1\x00', r1, r2) rmdir(&(0x7f0000000200)='./file0/file1\x00') ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f00000000c0)=0x1) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) 03:13:45 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) [ 311.515731] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 03:13:45 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 311.553809] atomic_op 00000000f58fedcd conn xmit_atomic (null) 03:13:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000200)=0xc) 03:13:45 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000010d00"}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000000)={0x203, 0x9, 0x0, 0xffffffffffffffff}) dup3(r3, r4, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') [ 311.639635] atomic_op 0000000037cb49c9 conn xmit_atomic (null) 03:13:45 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 311.715201] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000200)=0xc) 03:13:45 executing program 2 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:45 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00', 0x10d}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f585900000000000000000000000000000000000000000d0100"}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040900000000000000000400000000002000000000000000"], 0x24, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x14, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 311.869875] atomic_op 00000000110bc454 conn xmit_atomic (null) 03:13:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000200)=0xc) 03:13:45 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00', 0xd01000000000000}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) 03:13:45 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 311.990722] FAULT_INJECTION: forcing a failure. [ 311.990722] name failslab, interval 1, probability 0, space 0, times 0 [ 312.023917] atomic_op 00000000d604399d conn xmit_atomic (null) [ 312.053237] CPU: 1 PID: 10988 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 312.061511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.070873] Call Trace: [ 312.073488] dump_stack+0x244/0x39d [ 312.077138] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.082361] should_fail.cold.4+0xa/0x17 [ 312.086450] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.091590] ? lock_release+0xa10/0xa10 [ 312.095580] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.101059] ? zap_class+0x640/0x640 [ 312.104817] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 312.109868] ? find_held_lock+0x36/0x1c0 [ 312.113947] ? __lock_is_held+0xb5/0x140 [ 312.118040] ? put_dec+0x3b/0xf0 [ 312.121447] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.126916] ? zap_class+0x640/0x640 [ 312.130658] __should_failslab+0x124/0x180 [ 312.134923] should_failslab+0x9/0x14 [ 312.138747] kmem_cache_alloc_node+0x26e/0x730 [ 312.143346] ? find_held_lock+0x36/0x1c0 [ 312.147434] __alloc_skb+0x114/0x770 [ 312.151169] ? netdev_alloc_frag+0x1f0/0x1f0 [ 312.155594] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.160541] ? kasan_check_read+0x11/0x20 [ 312.164716] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.166075] atomic_op 00000000c6449b8e conn xmit_atomic (null) [ 312.170006] ? rcu_softirq_qs+0x20/0x20 [ 312.180889] ? netlink_has_listeners+0x2cb/0x4a0 [ 312.185662] ? netlink_tap_init_net+0x3d0/0x3d0 [ 312.190360] alloc_uevent_skb+0x84/0x1da [ 312.194442] kobject_uevent_env+0xa52/0x101e [ 312.198875] kobject_uevent+0x1f/0x24 [ 312.202690] lo_ioctl+0x1385/0x1d60 [ 312.206348] ? lo_rw_aio+0x1ef0/0x1ef0 [ 312.210258] blkdev_ioctl+0x98e/0x21b0 [ 312.214159] ? blkpg_ioctl+0xc10/0xc10 [ 312.218061] ? lock_downgrade+0x900/0x900 [ 312.222233] ? check_preemption_disabled+0x48/0x280 [ 312.227269] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.232215] ? kasan_check_read+0x11/0x20 [ 312.236379] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.241673] ? rcu_softirq_qs+0x20/0x20 [ 312.245672] ? __fget+0x4d1/0x740 [ 312.249152] ? ksys_dup3+0x680/0x680 [ 312.252895] block_ioctl+0xee/0x130 [ 312.256541] ? blkdev_fallocate+0x400/0x400 [ 312.260886] do_vfs_ioctl+0x1de/0x1790 [ 312.264790] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 312.270355] ? ioctl_preallocate+0x300/0x300 [ 312.274779] ? __fget_light+0x2e9/0x430 [ 312.278762] ? fget_raw+0x20/0x20 [ 312.282231] ? rcu_read_lock_sched_held+0x14f/0x180 [ 312.287263] ? kmem_cache_free+0x24f/0x290 [ 312.291516] ? putname+0xf7/0x130 [ 312.294993] ? do_syscall_64+0x9a/0x820 [ 312.298980] ? do_syscall_64+0x9a/0x820 03:13:45 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f0000000180)='./file0/file1\x00', r1, r2) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:45 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) r2 = add_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000002c0)="5b6868a291339aada3016e28a5c212eedecbd282a7fefd365db718d2c6eaa4d83d8104eb577d1aa6584e1cd906baa2722efeadb00d5d00db156103191cc23cb53279b540f63ea49a2cb3b76cffe6c02fc89627a2a4d88c4efcb8d1698387dbe2f9fbe66a6f5f561e984693cfff6387dc6a029aca57476db6f6d6612b54638080d88fb202b3cfe49d03489a5c523902e80d47a25e30df3b212dea3ed2af325f52e23e819a87d42d0c1f9ede2895e633568f322522e87587b2a60c4d04323d08ab6d80e43a4472ea16e5bb3f4d5c28966439d9ea0bde874efe3ca6a41980925fca684d77fc6e1d2e47f03485520180d10a39e08fbe56c2912c68b4a72412536e", 0xff, 0x0) r3 = request_key(&(0x7f0000000640)='big_key\x00', &(0x7f0000000680)={'syz', 0x2}, &(0x7f00000006c0)='system.posix_acl_access\x00', 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, r2, &(0x7f00000005c0)=[{&(0x7f0000000400)="06ffcf0a649ce5054c030c573b73e18b5bdce07324bab8e40324c041c23e9455034a39b96108a828b0c0dd5d477809a8c6cea88c1c49e7984b63c7838732a810f003206fc722b085f5bf765b1b7eba0744783199a8a140abc04ff3553f95807fc1a37f5f6091c3376af4fa1804db9212bfb498c55e2f17cd7d8258c4095ad3824a9030ebeb001eab496bf8253d514b0e22c30371da8da57b48be35672933cf6ef650a4001ca74b70db86d7286fc02f3c8dcea5a4b1f7e7745301a5d2ba89b540331766aeaba4fc56390ddb22437b27e16c501606a10a9ba3577b58bd3839d952ebc960ab0c514e9041a16ad68e9d844f57920f370f", 0xf5}, {&(0x7f0000000500)="1ed54c1251df17d30f89f8ab1203686b5734339abad8cacf272f43f517b4910d510532758bededce9ac103b489a8964ae790cbe8bb1a8d5f427993c9a28d6a369da76268e3c1b3766fdfcc8f6d192c4cf8db034ecdcda079df3a02", 0x5b}, {&(0x7f00000001c0)="c542b98f6d1a5c8aa760ca56660f657a24e7a9bd86500d5767466a657bbde1647c1ab5849a526620b499cc6227c7c30c", 0x30}, {&(0x7f0000000240)="7d5e6d260c74ef4586456264a14014e9ed0625d9f5be4bf4e3f3cc0701304a53d50d311ffa9d53f6d132", 0x2a}, {&(0x7f0000000580)="12bbcf", 0x3}], 0x5, r3) syz_open_dev$video(&(0x7f0000000700)='/dev/video#\x00', 0x6, 0x202000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 312.302971] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 312.307570] ? security_file_ioctl+0x94/0xc0 [ 312.311992] ksys_ioctl+0xa9/0xd0 [ 312.315463] __x64_sys_ioctl+0x73/0xb0 [ 312.319369] do_syscall_64+0x1b9/0x820 [ 312.323262] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.328616] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.333551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.338381] ? trace_hardirqs_on_caller+0x310/0x310 [ 312.343386] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 312.348389] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.353395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.358238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.363412] RIP: 0033:0x4573d7 [ 312.366593] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.385479] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.393174] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 312.400428] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 312.407686] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 312.414946] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 312.422201] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 312.443271] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:46 executing program 2 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:46 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0200000001000000000000000400052a0000000010000000000000000000000000000000"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r'}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00', 0x100000000000000}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:46 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00', 0x1000000}, &(0x7f0000000040)=0x1e) [ 312.677729] FAULT_INJECTION: forcing a failure. [ 312.677729] name failslab, interval 1, probability 0, space 0, times 0 [ 312.713214] CPU: 0 PID: 11036 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 312.721477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.730839] Call Trace: [ 312.733448] dump_stack+0x244/0x39d [ 312.737111] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.742337] should_fail.cold.4+0xa/0x17 [ 312.746418] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.751531] ? __save_stack_trace+0x8d/0xf0 [ 312.755880] ? zap_class+0x640/0x640 [ 312.759607] ? save_stack+0xa9/0xd0 [ 312.763250] ? save_stack+0x43/0xd0 [ 312.766905] ? find_held_lock+0x36/0x1c0 [ 312.770984] ? __lock_is_held+0xb5/0x140 [ 312.775081] ? zap_class+0x640/0x640 [ 312.778812] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.784289] ? check_preemption_disabled+0x48/0x280 [ 312.789333] __should_failslab+0x124/0x180 [ 312.793589] should_failslab+0x9/0x14 [ 312.797407] kmem_cache_alloc_node_trace+0x270/0x740 [ 312.802542] __kmalloc_node_track_caller+0x3c/0x70 [ 312.807485] __kmalloc_reserve.isra.40+0x41/0xe0 [ 312.812263] __alloc_skb+0x150/0x770 [ 312.815999] ? netdev_alloc_frag+0x1f0/0x1f0 [ 312.820433] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.825380] ? kasan_check_read+0x11/0x20 [ 312.829540] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.834841] ? rcu_softirq_qs+0x20/0x20 [ 312.838840] ? netlink_has_listeners+0x2cb/0x4a0 [ 312.843612] ? netlink_tap_init_net+0x3d0/0x3d0 [ 312.848298] alloc_uevent_skb+0x84/0x1da [ 312.852377] kobject_uevent_env+0xa52/0x101e [ 312.856813] kobject_uevent+0x1f/0x24 [ 312.860636] lo_ioctl+0x1385/0x1d60 [ 312.864283] ? lo_rw_aio+0x1ef0/0x1ef0 [ 312.868191] blkdev_ioctl+0x98e/0x21b0 [ 312.872105] ? blkpg_ioctl+0xc10/0xc10 [ 312.876011] ? lock_downgrade+0x900/0x900 [ 312.880180] ? check_preemption_disabled+0x48/0x280 [ 312.885226] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.890174] ? kasan_check_read+0x11/0x20 [ 312.894353] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.899648] ? rcu_softirq_qs+0x20/0x20 [ 312.903649] ? __fget+0x4d1/0x740 [ 312.907124] ? ksys_dup3+0x680/0x680 [ 312.910866] block_ioctl+0xee/0x130 [ 312.914512] ? blkdev_fallocate+0x400/0x400 [ 312.918881] do_vfs_ioctl+0x1de/0x1790 [ 312.922787] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 03:13:46 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 312.928341] ? ioctl_preallocate+0x300/0x300 [ 312.932771] ? __fget_light+0x2e9/0x430 [ 312.936772] ? fget_raw+0x20/0x20 [ 312.940248] ? rcu_read_lock_sched_held+0x14f/0x180 [ 312.945259] ? kmem_cache_free+0x24f/0x290 [ 312.949481] ? putname+0xf7/0x130 [ 312.952958] ? do_syscall_64+0x9a/0x820 [ 312.956923] ? do_syscall_64+0x9a/0x820 [ 312.960889] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 312.965463] ? security_file_ioctl+0x94/0xc0 [ 312.969865] ksys_ioctl+0xa9/0xd0 [ 312.973307] __x64_sys_ioctl+0x73/0xb0 [ 312.977197] do_syscall_64+0x1b9/0x820 [ 312.981106] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.986472] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.991394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.996233] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.001240] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.006246] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.011273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.016125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.021308] RIP: 0033:0x4573d7 [ 313.024490] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.043385] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.051098] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 313.058358] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 313.065613] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 313.072876] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 313.080147] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 313.097165] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:46 executing program 2 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:46 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0xa) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3, &(0x7f0000001500)=[{&(0x7f00000002c0)="bc1c416d8fe01483cdaa324bc1f82ed4ca1d8be6c5cadd21b8935310daef7c28e9958dc3a679af456718bd351146c5e7a98d3e15023caaca8aca1d5f280b69fe488fa1ad6b90a31edcc58a8d2cdb92e1e2ca70c97b6774ee4310aaa52b88f201e59fcf1d65f365f60c85152736d45f4821a393fc02c3267d9c6d47adf09a472a4cc79f795ef77531922ebf3a7cb0c94ba84b00154fe438da0940bd1940c11485c1f77d9dff9ad49f843f5c09f01b1e43e830b6ecfb3d1edf13b2f3beb28ab8fbc7b976e502d9294a39ea35fec75c3d971c49a5a953e8db", 0xd7, 0x5}, {&(0x7f0000000400)="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", 0x1000, 0x2}, {&(0x7f0000001400)="f556e2e5a6a25e6d8e8bca5d9a0d502da9f9d610321e92e1ec99c14b504204e22649e8bd43ac1573feac06e79984f7d83710f5da4f8d481fe639315c19285d1741cbcd7ef5c5f9e17105d3074c4ed4c2e2181fddcb1d7449e7b2e487ccb59c95a7cc2dc4e099c9f2ff13d8a3efe78e9f27fd2ad6ed9f18ce85fca87359ff75bd0716d7876d3ff08819b16efadc7e7167ca8a239fd0e985cd90a65f10f7511b214b4037184e9578980e12af899fb236ce3a2c641eea94fc74d6fb3f1d6a5a4f081b04159281d440bfa1ed97b62fe98b872cedd694c4fe68042d7ae9a48594e164a476b51a272f2a68da871b51", 0xec, 0x4}], 0x88880, &(0x7f00000017c0)=ANY=[@ANYBLOB='discard,nointegrity,nointegrity,usrquota,resize=0x0000000000000003,integrity,integrity,noquota,gid=', @ANYRESHEX=r2, @ANYBLOB=',fowner=', @ANYRESDEC=r1, @ANYBLOB="2c726f6f74634c6e746578743d0700636f6e6669a1b0ffe4e79740d5b5c526752c756c9bd8a9b6b00420d863c36569643d0db500fbacdef49599e85fff5072f957b96ba24f47aa68982fec8985e4d25d604c520374a4797ce0ff5ee33a468369ec8de3642fc792ddd61364745130642c5820623d73d4f2f6914ac31eb1f0d1b20f125ad0342b65d84009bd50c757dca268881614", @ANYRESDEC=r1, @ANYBLOB=',\x00']) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000000100004000000000020000000000000000000000000000000000000000000"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) socketpair(0x17, 0x5, 0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKGETSIZE64(r4, 0x80081272, &(0x7f0000001580)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r5, 0x80045301, &(0x7f0000000180)) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:46 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00', 0xd010000}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f5859000000000000000000000000000000000000000000010d"}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00', 0x100000000000000}, &(0x7f0000000040)=0x1e) 03:13:46 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00', 0xd01}, &(0x7f0000000040)=0x1e) [ 313.273782] FAULT_INJECTION: forcing a failure. [ 313.273782] name failslab, interval 1, probability 0, space 0, times 0 [ 313.306372] CPU: 0 PID: 11073 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 313.314632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.323994] Call Trace: [ 313.326601] dump_stack+0x244/0x39d [ 313.330260] ? dump_stack_print_info.cold.1+0x20/0x20 [ 313.335475] ? lock_downgrade+0x900/0x900 [ 313.339649] should_fail.cold.4+0xa/0x17 [ 313.343724] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.348854] ? rcu_softirq_qs+0x20/0x20 [ 313.352852] ? unwind_dump+0x190/0x190 [ 313.356771] ? is_bpf_text_address+0xd3/0x170 [ 313.361287] ? zap_class+0x640/0x640 [ 313.365019] ? __kernel_text_address+0xd/0x40 [ 313.369527] ? unwind_get_return_address+0x61/0xa0 03:13:47 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00', 0x1000000}, &(0x7f0000000040)=0x1e) 03:13:47 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x2000001e) [ 313.374473] ? find_held_lock+0x36/0x1c0 [ 313.378547] ? __lock_is_held+0xb5/0x140 [ 313.383059] ? acpi_ns_lookup+0x789/0xe05 [ 313.387254] ? kobject_uevent+0x1f/0x24 [ 313.391249] ? perf_trace_sched_process_exec+0x860/0x860 [ 313.396720] ? do_vfs_ioctl+0x1de/0x1790 [ 313.400792] ? ksys_ioctl+0xa9/0xd0 [ 313.404432] ? __x64_sys_ioctl+0x73/0xb0 [ 313.408510] ? do_syscall_64+0x1b9/0x820 [ 313.412597] __should_failslab+0x124/0x180 [ 313.416851] should_failslab+0x9/0x14 [ 313.420665] kmem_cache_alloc+0x2be/0x730 [ 313.424839] skb_clone+0x1bb/0x500 [ 313.428401] ? skb_split+0x11e0/0x11e0 [ 313.432335] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 313.437381] ? netlink_trim+0x1b4/0x380 [ 313.441365] ? netlink_skb_destructor+0x210/0x210 [ 313.446241] netlink_broadcast_filtered+0x110f/0x1680 [ 313.451456] ? __netlink_sendskb+0xd0/0xd0 [ 313.455724] ? kasan_check_read+0x11/0x20 [ 313.459888] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 313.465191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.470758] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 313.476234] ? refcount_add_not_zero_checked+0x330/0x330 [ 313.481703] ? netlink_has_listeners+0x2cb/0x4a0 [ 313.486473] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 313.491511] netlink_broadcast+0x3a/0x50 [ 313.495592] kobject_uevent_env+0xa83/0x101e [ 313.500028] kobject_uevent+0x1f/0x24 [ 313.503854] lo_ioctl+0x1385/0x1d60 [ 313.507508] ? lo_rw_aio+0x1ef0/0x1ef0 [ 313.511416] blkdev_ioctl+0x98e/0x21b0 [ 313.515500] ? blkpg_ioctl+0xc10/0xc10 [ 313.519394] ? lock_downgrade+0x900/0x900 [ 313.523551] ? check_preemption_disabled+0x48/0x280 [ 313.528587] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 313.533535] ? kasan_check_read+0x11/0x20 [ 313.537696] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 313.542985] ? rcu_softirq_qs+0x20/0x20 [ 313.546984] ? __fget+0x4d1/0x740 [ 313.550459] ? ksys_dup3+0x680/0x680 [ 313.554216] block_ioctl+0xee/0x130 [ 313.557846] ? blkdev_fallocate+0x400/0x400 [ 313.562179] do_vfs_ioctl+0x1de/0x1790 [ 313.566075] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 313.571604] ? ioctl_preallocate+0x300/0x300 [ 313.576001] ? __fget_light+0x2e9/0x430 [ 313.579969] ? fget_raw+0x20/0x20 [ 313.583443] ? rcu_read_lock_sched_held+0x14f/0x180 [ 313.588458] ? kmem_cache_free+0x24f/0x290 [ 313.592683] ? putname+0xf7/0x130 [ 313.596129] ? do_syscall_64+0x9a/0x820 [ 313.600099] ? do_syscall_64+0x9a/0x820 [ 313.604075] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 313.608649] ? security_file_ioctl+0x94/0xc0 [ 313.613047] ksys_ioctl+0xa9/0xd0 [ 313.616498] __x64_sys_ioctl+0x73/0xb0 [ 313.620374] do_syscall_64+0x1b9/0x820 [ 313.624252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.629606] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.634524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.639359] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.644385] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.649391] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.654399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.659235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.664411] RIP: 0033:0x4573d7 [ 313.667603] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.686536] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.694236] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 313.701490] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 313.708745] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 313.716011] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:13:47 executing program 2 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:47 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00', 0xd010000}, &(0x7f0000000040)=0x1e) 03:13:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:47 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2001, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f00000000c0)={0x6}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f0000000100)=0xfffffffffffffd20) r2 = pkey_alloc(0x0, 0x1) pkey_free(r2) [ 313.723293] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 313.736910] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:47 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000d01"}, &(0x7f0000000040)=0x1e) 03:13:47 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = dup(0xffffffffffffff9c) bind$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000100), &(0x7f0000000180)=0x18) [ 313.809435] Unknown ioctl 44657 03:13:47 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00', 0xd01}, &(0x7f0000000040)=0x1e) 03:13:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) [ 313.864621] Unknown ioctl 44657 03:13:47 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:47 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x1) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000180)={0xff, 0x6, 0x20, {r2, r3+10000000}, 0xc1, 0x1}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) socketpair$inet(0x2, 0x6, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)=0x8200, 0x4) [ 313.917883] FAULT_INJECTION: forcing a failure. [ 313.917883] name failslab, interval 1, probability 0, space 0, times 0 [ 313.957618] CPU: 1 PID: 11109 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 03:13:47 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02a9eb00008200000000002004000020000000004c34a4501b57a79a2f00e2ffffffff2d"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f0000000100)='./file0/file1\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 313.965919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.975289] Call Trace: [ 313.977902] dump_stack+0x244/0x39d [ 313.981559] ? dump_stack_print_info.cold.1+0x20/0x20 [ 313.986784] ? lock_downgrade+0x900/0x900 [ 313.990965] should_fail.cold.4+0xa/0x17 [ 313.995054] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.000183] ? rcu_softirq_qs+0x20/0x20 [ 314.004162] ? unwind_dump+0x190/0x190 [ 314.008045] ? is_bpf_text_address+0xd3/0x170 [ 314.012539] ? zap_class+0x640/0x640 03:13:47 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 314.016262] ? __kernel_text_address+0xd/0x40 [ 314.020776] ? unwind_get_return_address+0x61/0xa0 [ 314.025731] ? find_held_lock+0x36/0x1c0 [ 314.029811] ? __lock_is_held+0xb5/0x140 [ 314.033894] ? kobject_uevent+0x1f/0x24 [ 314.037883] ? perf_trace_sched_process_exec+0x860/0x860 [ 314.043356] ? do_vfs_ioctl+0x1de/0x1790 [ 314.047438] ? ksys_ioctl+0xa9/0xd0 [ 314.051088] ? __x64_sys_ioctl+0x73/0xb0 [ 314.055166] ? do_syscall_64+0x1b9/0x820 [ 314.059357] __should_failslab+0x124/0x180 [ 314.063610] should_failslab+0x9/0x14 [ 314.067425] kmem_cache_alloc+0x2be/0x730 [ 314.071599] skb_clone+0x1bb/0x500 [ 314.075152] ? skb_split+0x11e0/0x11e0 [ 314.079077] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 314.084111] ? netlink_trim+0x1b4/0x380 [ 314.088126] ? netlink_skb_destructor+0x210/0x210 [ 314.092993] netlink_broadcast_filtered+0x110f/0x1680 [ 314.098211] ? __netlink_sendskb+0xd0/0xd0 [ 314.102485] ? kasan_check_read+0x11/0x20 [ 314.106680] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 314.111997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.117565] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 314.123046] ? refcount_add_not_zero_checked+0x330/0x330 [ 314.128522] ? netlink_has_listeners+0x2cb/0x4a0 [ 314.133295] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 314.138331] netlink_broadcast+0x3a/0x50 [ 314.142415] kobject_uevent_env+0xa83/0x101e [ 314.146852] kobject_uevent+0x1f/0x24 [ 314.150691] lo_ioctl+0x1385/0x1d60 [ 314.154370] ? lo_rw_aio+0x1ef0/0x1ef0 [ 314.158275] blkdev_ioctl+0x98e/0x21b0 [ 314.162170] ? blkpg_ioctl+0xc10/0xc10 [ 314.166053] ? lock_downgrade+0x900/0x900 [ 314.170209] ? check_preemption_disabled+0x48/0x280 [ 314.175227] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 314.180152] ? kasan_check_read+0x11/0x20 [ 314.184293] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 314.189571] ? rcu_softirq_qs+0x20/0x20 [ 314.193563] ? __fget+0x4d1/0x740 [ 314.197008] ? ksys_dup3+0x680/0x680 [ 314.200723] block_ioctl+0xee/0x130 [ 314.204353] ? blkdev_fallocate+0x400/0x400 [ 314.208706] do_vfs_ioctl+0x1de/0x1790 [ 314.212599] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 314.218125] ? ioctl_preallocate+0x300/0x300 [ 314.222524] ? __fget_light+0x2e9/0x430 [ 314.226486] ? fget_raw+0x20/0x20 [ 314.229930] ? rcu_read_lock_sched_held+0x14f/0x180 [ 314.234945] ? kmem_cache_free+0x24f/0x290 [ 314.239168] ? putname+0xf7/0x130 [ 314.242623] ? do_syscall_64+0x9a/0x820 [ 314.246588] ? do_syscall_64+0x9a/0x820 [ 314.250552] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 314.255125] ? security_file_ioctl+0x94/0xc0 [ 314.259530] ksys_ioctl+0xa9/0xd0 [ 314.262977] __x64_sys_ioctl+0x73/0xb0 [ 314.266862] do_syscall_64+0x1b9/0x820 [ 314.270742] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.276099] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.281015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.285848] ? trace_hardirqs_on_caller+0x310/0x310 [ 314.290855] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 314.295875] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.300910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.305747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.310925] RIP: 0033:0x4573d7 [ 314.314109] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.333020] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 314.340723] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 314.347983] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 314.355240] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 314.362509] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 314.369781] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 314.395172] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:48 executing program 2 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:48 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={"54bb5000"}, &(0x7f0000000040)=0x1e) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x16, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x3}, 0x28, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x101100, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000240)) 03:13:48 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00', 0x10d}, &(0x7f0000000040)=0x1e) 03:13:48 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) syz_mount_image$f2fs(&(0x7f0000000400)='f2fs\x00', &(0x7f0000000440)='./file0\x00', 0x8000, 0x4, &(0x7f0000000740)=[{&(0x7f0000000480)="9c89f4141713ef58195b1d7a", 0xc, 0x100}, {&(0x7f00000004c0)="46e20c2849c3fa45961b88e0afc8194a581de7018d20dee781710eff7394b99d5f06871d5a6c54720e584620ff1496dc14b03563ff6188b8152977df1fc5ee020d70e51b7b35381c639e3946d3b0a509159f5d9747253def0a50c88e795ca3f68474f05394e206ef14843c51716f6e9127146533d2ff7d2248613f3d3fbbd4750e9b638b2be0b11ed0", 0x89, 0x2}, {&(0x7f0000000580)="08dd2aa30cc8cbba5fc10f615dbd1eeb6e169487d8ac899c8c95136c717bbe78fa59da5a2633ce6f0d6034a2fa8478ef39da4aad6749f2b55711e01be884671b338297eca1b8d6cb29defdfd81c491151a234728bab06b8a19306f90d5f8a555f6ab8ef89af8bf0d88447fc5079a8ac5e39a7be530b069fad63a3bcdcd4d0d178a12248d11b378222c8aa9d41e58cdc9bb56c7136c191d614a615fda0acac5313d98176844a1a44a203e47628b6077821455a88f7749de796d04bd4a3133642f5e36d5c17e8036d65155c01efcee41301440181901dd764bd0b0a2f90aa2", 0xde, 0xffffffffffffff85}, {&(0x7f0000000680)="832571f6181959baee4909096bc2bccaf8c0f8ee18d2767443c5799b528d3ad3f8f5321b2e8e23b3a866b967ada1471b8029fef41a9d52f927f660603c81b8f2cadf690d62c231d3f7c55a34122b387f2107b23cfd6c79ca5f6963d24418992a5644bd1311ab9a177c39cd7d8ec4163e5f4e6f3054748c5fa10c4c6a99de14bf67abea15c9ec137631a3613e61", 0x8d, 0x7}], 0x40000, &(0x7f00000007c0)={[{@background_gc_on='background_gc=on'}, {@nolazytime='nolazytime'}, {@noheap='noheap'}], [{@subj_type={'subj_type', 0x3d, 'system.posix_acl_access\x00'}}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000180)='./file0\x00', 0x2) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="020000000100000000000000040d00000000000010000400000000002000000000000000008393c023f40601bdab126a5e1f8578c6030000006fe615399a4dfc41a639dfc4f7bcdf"], 0x24, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000840)={0x0, 0x1}, &(0x7f0000000880)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000008c0)={r3, 0x800000000000004}, &(0x7f0000000a00)=0x270) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x7ff, 0x40000) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, &(0x7f00000003c0)=0x77d34831, 0x146a77d4, 0x6) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0xe6, 0xcf, 0xf4, &(0x7f00000002c0)="8d4b3ea904af70feaa2b6b8cfc8363e0edcc0a573078a03810e1264638f5ad2fee1c6a6162eb3840f85914497df1b5ee93d252139e405c2864dc6205019e35f221e5b51b918b0a2a79bb6995500de1a652317b298b14908c10a836c01e879311edbac6a8e94b5d22f5a437f0bd4dd57796afda93bba0cdb7de38c7625921da249984be75a040c95ddb3c0a957f4fc6ca3ce4b84095db3b8749ccb5a80b692e52d4faf551b6157fca0059b70405b1b2fa52075b72f452702f898797b05038a0edab33f5c215af60054be6a2235d689425903356f3c7cd8bf1292270246353dd92b9a539171bd0dcacb5b068046942c7d395528c8c"}) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:48 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 314.501697] atomic_op 00000000aab1d1b8 conn xmit_atomic (null) 03:13:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00', 0xd01000000000000}, &(0x7f0000000040)=0x1e) 03:13:48 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:48 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f0000000180)='./file0\x00', r1, r2) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f00000002c0)={0x4, 0x0, [{0x80000019, 0x8, 0x3, 0x9, 0x7, 0x4, 0x4}, {0x2, 0x2, 0x1, 0x2, 0x8, 0x8d2e, 0x3}, {0xc000000f, 0xa6bc, 0x4, 0x9, 0x80000000, 0x9, 0x8001}, {0xc0000019, 0xa2c, 0x2, 0x0, 0xff, 0x3, 0x200}]}) rmdir(&(0x7f0000000100)='./file0/file1\x00') 03:13:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0xffffffffffffff59) [ 314.581412] FAULT_INJECTION: forcing a failure. [ 314.581412] name failslab, interval 1, probability 0, space 0, times 0 [ 314.655815] atomic_op 00000000dad11177 conn xmit_atomic (null) [ 314.686950] CPU: 0 PID: 11145 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 314.695220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.704586] Call Trace: [ 314.707198] dump_stack+0x244/0x39d [ 314.710857] ? dump_stack_print_info.cold.1+0x20/0x20 [ 314.716063] ? __kernel_text_address+0xd/0x40 [ 314.720583] ? unwind_get_return_address+0x61/0xa0 [ 314.725533] should_fail.cold.4+0xa/0x17 [ 314.729609] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.734736] ? kasan_kmalloc+0xc7/0xe0 [ 314.738640] ? __kmalloc_track_caller+0x157/0x760 [ 314.743491] ? memdup_user+0x2c/0xa0 [ 314.743509] ? zap_class+0x640/0x640 [ 314.743526] ? do_syscall_64+0x1b9/0x820 [ 314.743542] ? zap_class+0x640/0x640 [ 314.743557] ? zap_class+0x640/0x640 [ 314.743579] ? find_held_lock+0x36/0x1c0 [ 314.743618] ? perf_trace_sched_process_exec+0x860/0x860 [ 314.751039] ? lock_release+0xa10/0xa10 [ 314.751054] ? perf_trace_sched_process_exec+0x860/0x860 [ 314.751083] ? usercopy_warn+0x110/0x110 [ 314.751106] __should_failslab+0x124/0x180 [ 314.751126] should_failslab+0x9/0x14 [ 314.762639] kmem_cache_alloc_trace+0x2d7/0x750 [ 314.762675] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 314.762692] ? _copy_from_user+0xdf/0x150 [ 314.762714] copy_mount_options+0x5f/0x430 [ 314.772237] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 314.772259] ksys_mount+0xd0/0x140 [ 314.772285] __x64_sys_mount+0xbe/0x150 [ 314.789975] do_syscall_64+0x1b9/0x820 [ 314.789994] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 314.790013] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.790034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.798496] ? trace_hardirqs_on_caller+0x310/0x310 [ 314.798515] ? prepare_exit_to_usermode+0x3b0/0x3b0 03:13:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x27) [ 314.798532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.798549] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.798570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.865014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.865028] RIP: 0033:0x459fda [ 314.865045] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 314.865053] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:13:48 executing program 2 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:48 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:48 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket(0x0, 0x102, 0x0) accept$unix(r0, &(0x7f00000002c0), &(0x7f0000000240)=0x6e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x80080, 0x0) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f00000004c0)=""/4096) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="0200000001000000000000040000400000000010000400000000002000493cff1def0c498bd34b44d1f3f2e8fc49f4d68b42a2f16764eff0594642d94e5dc56d46244ddf5d481cecc92e5ff40ae465ba373109ae0e897b8d76ff9efe63ca6a416c87f1d596d0a6ce154580bd877b1dc25b5dd32a4010b3aaaf2f771445fc40cf94e2fd1b0001000051eba0fe9a7a66c35cda51c665ef4d0cac429fa54aa6b6a9a21b9d9f0be055e8acfb3915d900549059a7e28ea60a"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='vmnet0\'procposix_acl_accessselinuxcpusetselinux}vboxnet0\x00', 0x39, 0x3) 03:13:48 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x40, 0x80000) ioctl$TUNSETLINK(r1, 0x400454cd, 0xf) poll(&(0x7f0000000100)=[{r0, 0x1000}, {r1, 0x2a}], 0x1, 0xeede) pkey_alloc(0x0, 0x2) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000140)) ioctl$TUNSETLINK(r1, 0x400454cd, 0x307) ioctl$RTC_UIE_ON(r1, 0x7003) 03:13:48 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x101000) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000100)={0xfffffffffffffffe, {{0xa, 0x4e20, 0x81, @remote, 0x6}}}, 0x88) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = dup(r0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x4c7) [ 314.865079] RAX: ffffffffffffffda RBX: 00007f2403fd5b30 RCX: 0000000000459fda [ 314.865089] RDX: 00007f2403fd5ad0 RSI: 0000000020000080 RDI: 00007f2403fd5af0 [ 314.865099] RBP: 0000000020000080 R08: 00007f2403fd5b30 R09: 00007f2403fd5ad0 [ 314.865114] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 314.875137] R13: 0000000000100020 R14: 00000000004d8258 R15: 0000000000000003 03:13:48 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={"5450524f58590000000000000000000000000000000000000000000001"}, &(0x7f0000000040)=0x1e) [ 315.009668] atomic_op 000000007adea762 conn xmit_atomic (null) [ 315.025504] QAT: Invalid ioctl [ 315.044116] QAT: Invalid ioctl 03:13:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) [ 315.110172] FAULT_INJECTION: forcing a failure. [ 315.110172] name failslab, interval 1, probability 0, space 0, times 0 [ 315.123077] CPU: 1 PID: 11175 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 315.131345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.140719] Call Trace: [ 315.143378] dump_stack+0x244/0x39d [ 315.147035] ? dump_stack_print_info.cold.1+0x20/0x20 [ 315.152250] ? __kernel_text_address+0xd/0x40 [ 315.156790] ? unwind_get_return_address+0x61/0xa0 [ 315.161740] should_fail.cold.4+0xa/0x17 [ 315.165816] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.170939] ? kasan_kmalloc+0xc7/0xe0 [ 315.174894] ? __kmalloc_track_caller+0x157/0x760 [ 315.179747] ? memdup_user+0x2c/0xa0 [ 315.183474] ? zap_class+0x640/0x640 [ 315.187205] ? do_syscall_64+0x1b9/0x820 [ 315.191280] ? zap_class+0x640/0x640 [ 315.195003] ? zap_class+0x640/0x640 [ 315.198743] ? find_held_lock+0x36/0x1c0 [ 315.202844] ? perf_trace_sched_process_exec+0x860/0x860 [ 315.208305] ? lock_release+0xa10/0xa10 [ 315.212289] ? perf_trace_sched_process_exec+0x860/0x860 [ 315.217756] ? usercopy_warn+0x110/0x110 [ 315.221831] __should_failslab+0x124/0x180 [ 315.226109] should_failslab+0x9/0x14 [ 315.229922] kmem_cache_alloc_trace+0x2d7/0x750 [ 315.234611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.240168] ? _copy_from_user+0xdf/0x150 [ 315.244342] copy_mount_options+0x5f/0x430 [ 315.248606] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.254164] ksys_mount+0xd0/0x140 03:13:48 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000380)=0x7, &(0x7f0000000400)=0x2) getsockname(r3, &(0x7f0000000300)=@alg, &(0x7f0000000000)=0x80) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0x9, "16d3b7b11354b7bc395907f8ea44f6674ffbd2"}, 0x15, 0x1) setxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$l2tp(r0, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x4, 0x6, 0x3, 0x3, {0xa, 0x4e20, 0xfd07, @mcast2, 0xfffffffffffffffa}}}, 0x3a) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:48 executing program 3: removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.sockprotoname\x00') r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7fff, 0x400000) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000140)=""/91, 0x5b}, {&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f0000000280)=""/122, 0x7a}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000000380)=""/155, 0x9b}, {&(0x7f0000000440)=""/1, 0x1}, {&(0x7f0000000480)=""/232, 0xe8}, {&(0x7f0000000580)=""/23, 0x17}, {&(0x7f00000005c0)=""/79, 0x4f}], 0x9, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000700)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 315.257730] __x64_sys_mount+0xbe/0x150 [ 315.261729] do_syscall_64+0x1b9/0x820 [ 315.265680] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 315.271080] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.276027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.280885] ? trace_hardirqs_on_caller+0x310/0x310 [ 315.285918] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 315.285938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.285955] ? prepare_exit_to_usermode+0x291/0x3b0 [ 315.285977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.286000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.296543] RIP: 0033:0x459fda [ 315.296561] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.296570] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 315.296586] RAX: ffffffffffffffda RBX: 00007f2403fd5b30 RCX: 0000000000459fda [ 315.296595] RDX: 00007f2403fd5ad0 RSI: 0000000020000080 RDI: 00007f2403fd5af0 03:13:48 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x80000001, 0x2) 03:13:48 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) [ 315.296610] RBP: 0000000020000080 R08: 00007f2403fd5b30 R09: 00007f2403fd5ad0 [ 315.306460] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 315.306470] R13: 0000000000100020 R14: 00000000004d8258 R15: 0000000000000003 [ 315.418077] atomic_op 00000000071c6c70 conn xmit_atomic (null) 03:13:49 executing program 2 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:49 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x5, @empty, 0x5}}, 0x1000, 0x2, 0x3f, 0xe68b, 0x3}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r3, 0xffff, 0x401}, 0x8) mkdir(&(0x7f0000000480)='./file0\x00', 0xc9) rmdir(&(0x7f0000000200)='./file0/file1\x00') ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000400)={0x100000000, {0x2, 0x4e24, @remote}, {0x2, 0x4e22}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, 0x100, 0x9, 0x4, 0x2, 0x2, &(0x7f0000000380)='bcsh0\x00', 0x81, 0x4ef, 0x57}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0/file1\x00') 03:13:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x2, 0x400400) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f00000000c0)=0x1ff) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r2 = socket$inet6(0xa, 0x7, 0xb) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x9c, "5fcd24d5983883f0dfb03a12391ffa5f1ffbee9ea299f851e452b41c3fc85466a57a1b2cbc40878c46e90ee3dc3d2075260a374fb0e526412721add2fbeafa602f89f7e9a67d52a22287a524fcff35a4f35d616c61139c7c1c470e755ff460339ab9fb00829974d84243e327465857c21ac87e9d50645016b63fbd8cd6ac7e1c9b97db3a63156020392dc147db50908c36ac1fe3efb58d6cd4c2966d"}, &(0x7f00000002c0)=0xa4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000300)={r3, 0xffff, 0x5, [0x5, 0xb367, 0x1, 0x0, 0x1]}, &(0x7f0000000340)=0x12) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000440)={'filter\x00', 0x0, 0x3, 0x14, [], 0x9, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/20}, &(0x7f00000001c0)=0x78) 03:13:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r'}, &(0x7f0000000040)=0x1e) 03:13:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x0, 0xfffffffffffffffc}, 0x8) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x41, &(0x7f0000000000)={"d450524f58590000000000000000000000a10700ddffffbe0b32bd00"}, &(0x7f00000001c0)=0x2e3) socket$nl_route(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80080, 0x140) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000000c0)={{0x1, 0x3}, 'port0\x00', 0x30, 0x80000, 0x5d, 0x7fff, 0x8001, 0x6, 0xff, 0x0, 0x4, 0x3}) 03:13:49 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00', 0xd01000000000000}, &(0x7f0000000040)=0x1e) 03:13:49 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:49 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000100)=@can={0x1d, r1}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000180)="a174f1c318ff5755b47bed261648b57742899d074342d17df4dff6a8fa0bca69c0a0242fe2819fe8ec3c4df3f8c290333db6aea1f35146f7cd9b0b092e8e426e485ff83a97d4f10ee3f9b6f64072318208509be883a781d6658698e55ec190ad08d5c2452913d78772d6939b10c9465e80c50fa8521b1ec74353eb4bf1c3ac1b6aa6ab9e488aa1a8506c09f37c6859ab46e0ccc9e84f2393ec3df62ec3241022ba762c5f8a993bf7fb350a5f5e766577d6d5abf003a3fd065a612f1dd6af4ccfd0a8cd70c67f930b592ec9b6edb9c8b67e7c7ffe88d55aea8dd35aad0f0fd65f7150c5a427af1500e1c7a2", 0xeb}, {&(0x7f0000000280)="7046d0f6709f53df11b0274256258ea980b782c02417704895044494276dd21f08498059d88e37ba5b858132b373b5b0ca3e81aea7724389eb95cb25db85baef3ddfa77be1fe7c28d961daead568f720dcb89e6f1255839a3d9e729e1f8a691d2a7110492b4823599c09ba6448bd085b583d6098257312392733ac581c7dbcfd8ebd90902f97dbb62cfa3683eb2cd971a234cad75d70dd8b60c3", 0x9a}, {&(0x7f0000000340)="51c2eb60e751d300830b06fe3d2eef15cc142bb186a7014f21172155af0a2253a587685d31326c8776cbcca982b519579d69", 0x32}, {&(0x7f0000000380)="a51ef20f05a96747823a74b5010360a90d4fb84d82f9c6da691a5439c6d3331ae1e66e75961388e2b23fbf3b8c22d3c11ad18c62cd156bfdd8e5d4e60b4e272f40bfe1a383f5a974f919e590823e9dee06b3aec466543d450acb29600f301de5f978fd32129cadcd013080186d3b397f0e43aa64e40d9f2cf1eb8d974416b2ddcf3c7b813ccc279a6d876ffa2adf91b2f3739d0b3af9684f0576fe265e8208cbe6020d44487bae5184a88a5f05bdd29bc6fe9f68b6e3b61b12a201178887664f5db5bf12187b9f18378477e4ef69a5e0eb787951c22383", 0xd7}], 0x4, &(0x7f00000004c0), 0x0, 0x80}, 0x1) 03:13:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r1, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/184, 0xb8}, {&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/107, 0x6b}], 0x3, &(0x7f0000000300)=""/69, 0x45, 0x6}, 0x9c97}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000380)=""/158, 0x9e}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2, &(0x7f0000001480)=""/185, 0xb9, 0xffffffffffff8001}, 0x7f}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001540)=""/58, 0x3a}, {&(0x7f0000001580)=""/13, 0xd}, {&(0x7f00000015c0)=""/119, 0x77}], 0x3, &(0x7f0000001680)=""/2, 0x2, 0xfffffffffffffffd}}], 0x3, 0x2022, 0x0) 03:13:49 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f0000000180)="791ce8324b2a520aceeac3c3a3db58915bed9b57ffffb384b409b35f0e6a919d0b017474a2cc5f191a6e8fbf170287a403267a3bd86247fa52e0cb434888caea2d0acc5c6f360cbbdb4e7f3025c1a787e8525183bc97501b41a31e", 0x5b}, {&(0x7f0000000100)="b2799e236e23bb80db6f8f29c90768702df10c2e8174cf6b0cf736f8", 0x1c}, {&(0x7f0000000240)="bc6bf3f4ed97de9b4e14c9e36c7e7596cd6e3b207c8aa1", 0x17}, {&(0x7f00000002c0)="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", 0xfb}], 0x4, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02b1b45149c9bd795a000000040000000000000010000400000000002000000000000000551bc95e390decf38ecc729632818d0475925f63014b6d16dab535791a257ad14d3a26750b94d86105dfebaba90119801dc5cd42ea9ef56b9a2714"], 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0/file1\x00', &(0x7f00000004c0)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'L+', 0x1}, 0x28, 0x3) 03:13:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00', 0x100000000000000}, &(0x7f0000000040)=0x1e) [ 315.701823] FAULT_INJECTION: forcing a failure. [ 315.701823] name failslab, interval 1, probability 0, space 0, times 0 [ 315.752979] CPU: 0 PID: 11211 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 315.752994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.770616] Call Trace: [ 315.773232] dump_stack+0x244/0x39d [ 315.776907] ? dump_stack_print_info.cold.1+0x20/0x20 [ 315.776942] ? find_held_lock+0x36/0x1c0 [ 315.776969] should_fail.cold.4+0xa/0x17 [ 315.786308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.795464] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 315.800417] ? kasan_check_read+0x11/0x20 [ 315.804599] ? rcu_softirq_qs+0x20/0x20 [ 315.808600] ? rcu_softirq_qs+0x20/0x20 [ 315.812587] ? unwind_dump+0x190/0x190 [ 315.816499] ? find_held_lock+0x36/0x1c0 [ 315.820591] ? perf_trace_sched_process_exec+0x860/0x860 [ 315.826050] ? save_stack+0xa9/0xd0 [ 315.829700] ? kmem_cache_alloc_trace+0x152/0x750 [ 315.834560] ? copy_mount_options+0x5f/0x430 [ 315.838985] __should_failslab+0x124/0x180 [ 315.843245] should_failslab+0x9/0x14 [ 315.847055] kmem_cache_alloc+0x2be/0x730 [ 315.851237] ? find_held_lock+0x36/0x1c0 [ 315.855320] getname_flags+0xd0/0x590 [ 315.855342] user_path_at_empty+0x2d/0x50 [ 315.855369] do_mount+0x180/0x1ff0 [ 315.863314] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 315.863333] ? rcu_pm_notify+0xc0/0xc0 [ 315.863353] ? copy_mount_string+0x40/0x40 [ 315.863375] ? copy_mount_options+0x5f/0x430 [ 315.863392] ? rcu_read_lock_sched_held+0x14f/0x180 [ 315.863414] ? kmem_cache_alloc_trace+0x353/0x750 [ 315.894832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.900387] ? _copy_from_user+0xdf/0x150 [ 315.904553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.904572] ? copy_mount_options+0x315/0x430 [ 315.904594] ksys_mount+0x12d/0x140 [ 315.904621] __x64_sys_mount+0xbe/0x150 [ 315.914670] do_syscall_64+0x1b9/0x820 [ 315.914688] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 315.914706] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.914734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.914759] ? trace_hardirqs_on_caller+0x310/0x310 [ 315.946358] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 315.951386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.956936] ? prepare_exit_to_usermode+0x291/0x3b0 [ 315.961968] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.966839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.972055] RIP: 0033:0x459fda [ 315.975283] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 315.994192] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.001922] RAX: ffffffffffffffda RBX: 00007f2403fd5b30 RCX: 0000000000459fda [ 316.009199] RDX: 00007f2403fd5ad0 RSI: 0000000020000080 RDI: 00007f2403fd5af0 [ 316.016481] RBP: 0000000020000080 R08: 00007f2403fd5b30 R09: 00007f2403fd5ad0 [ 316.023755] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 316.031033] R13: 0000000000100020 R14: 00000000004d8258 R15: 0000000000000003 03:13:49 executing program 2 (fault-call:2 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000000c0)) 03:13:49 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:49 executing program 3: r0 = getpid() sched_getaffinity(r0, 0x8, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e24, @local}, 0x10) r2 = socket$inet_dccp(0x2, 0x6, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x6) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00', 0x1000000}, &(0x7f0000000040)=0x1e) 03:13:49 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) setreuid(r1, r1) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000240)) rmdir(&(0x7f0000000200)='./file0/file1\x00') getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14) bind(r2, &(0x7f00000002c0)=@can={0x1d, r4}, 0x80) readlink(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000400)=""/222, 0xde) [ 316.152324] rds_sendmsg: 2 callbacks suppressed [ 316.152337] atomic_op 00000000417db20d conn xmit_atomic (null) [ 316.204099] FAULT_INJECTION: forcing a failure. [ 316.204099] name failslab, interval 1, probability 0, space 0, times 0 [ 316.218869] CPU: 0 PID: 11242 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 316.227114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.236479] Call Trace: [ 316.239099] dump_stack+0x244/0x39d [ 316.242757] ? dump_stack_print_info.cold.1+0x20/0x20 [ 316.247969] ? find_held_lock+0x36/0x1c0 [ 316.248000] should_fail.cold.4+0xa/0x17 [ 316.256130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.261260] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 316.266211] ? kasan_check_read+0x11/0x20 [ 316.270378] ? rcu_softirq_qs+0x20/0x20 [ 316.274362] ? rcu_softirq_qs+0x20/0x20 [ 316.274377] ? unwind_dump+0x190/0x190 [ 316.274406] ? find_held_lock+0x36/0x1c0 [ 316.274443] ? perf_trace_sched_process_exec+0x860/0x860 [ 316.286333] ? save_stack+0xa9/0xd0 [ 316.286354] ? kmem_cache_alloc_trace+0x152/0x750 [ 316.286370] ? copy_mount_options+0x5f/0x430 [ 316.286391] __should_failslab+0x124/0x180 [ 316.295458] should_failslab+0x9/0x14 [ 316.295476] kmem_cache_alloc+0x2be/0x730 [ 316.295496] ? find_held_lock+0x36/0x1c0 [ 316.320953] getname_flags+0xd0/0x590 [ 316.324775] user_path_at_empty+0x2d/0x50 [ 316.328948] do_mount+0x180/0x1ff0 [ 316.332509] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 316.338057] ? rcu_pm_notify+0xc0/0xc0 [ 316.341966] ? copy_mount_string+0x40/0x40 [ 316.341990] ? copy_mount_options+0x5f/0x430 [ 316.342007] ? rcu_read_lock_sched_held+0x14f/0x180 [ 316.342028] ? kmem_cache_alloc_trace+0x353/0x750 [ 316.360516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.366083] ? _copy_from_user+0xdf/0x150 [ 316.370250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.375805] ? copy_mount_options+0x315/0x430 [ 316.380317] ksys_mount+0x12d/0x140 [ 316.383970] __x64_sys_mount+0xbe/0x150 [ 316.387958] do_syscall_64+0x1b9/0x820 [ 316.387976] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.387997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.402169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.407038] ? trace_hardirqs_on_caller+0x310/0x310 [ 316.412095] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 316.417135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.422693] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.427732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.432599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.437798] RIP: 0033:0x459fda 03:13:49 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) fadvise64(r0, 0x41, 0x55, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 03:13:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00', 0xd010000}, &(0x7f0000000040)=0x1e) 03:13:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00', 0xd01}, &(0x7f0000000040)=0x1e) 03:13:50 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00', 0x10d}, &(0x7f0000000040)=0x1e) 03:13:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffeff, 0x3, 0x4, 0x80, 0x3, 0x3, 0x3f, 0x1, 0x3b9, 0x40, 0x92, 0x4, 0x40, 0x38, 0x1, 0x0, 0x3, 0x100000000}, [{0x0, 0x80000000, 0x9, 0x5, 0x100, 0x100, 0x0, 0x9}], "53cffeade32de3d14667cb8924be", [[], []]}, 0x286) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) [ 316.437815] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 316.437824] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.441664] atomic_op 00000000e5b4a9fc conn xmit_atomic (null) [ 316.459936] RAX: ffffffffffffffda RBX: 00007f2403fd5b30 RCX: 0000000000459fda [ 316.459946] RDX: 00007f2403fd5ad0 RSI: 0000000020000080 RDI: 00007f2403fd5af0 [ 316.459963] RBP: 0000000020000080 R08: 00007f2403fd5b30 R09: 00007f2403fd5ad0 [ 316.459970] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 316.459977] R13: 0000000000100020 R14: 00000000004d8258 R15: 0000000000000003 03:13:50 executing program 2 (fault-call:2 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:50 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x7fff, 0x301001) epoll_wait(r1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x5, 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000200)={"5450524f58590000001500"}, &(0x7f0000000240)=0x1e) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000100)=""/155) 03:13:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4c202, 0x0) r2 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x1050, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000180)={r2}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x401, 0x0) 03:13:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x14) write$binfmt_elf32(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x8, 0x2, 0xffff, 0x5, 0x2, 0x3e, 0x2, 0x148, 0x38, 0x2f6, 0xff, 0xafe, 0x20, 0x1, 0xb6, 0x7, 0x1}, [{0x3, 0xfffffffffffffff9, 0x8000, 0x81, 0x7fff, 0x2a4, 0xdcd, 0x400}, {0x7, 0x81, 0x7ff, 0xfffffffffffffff8, 0x2, 0x7, 0x6, 0x38c5}], "a6153c592e9fc9359f81ac7aff301f9f79a844530fc29525b1958eba6707d71e7933cab2fe1eae0fa4a3d95ca2198a137fe32b5f9a04d3a7afe626bed3c2cd9af1ca62526892298729aef147ceac9a81979fe7ac9dd32e6985659058123d53204befbf02c404a080851054710a44f2d3bf997fc8e506307c91c4da5f0b216219f436c010a272b75fb6b968799e4304a336c9cb099392bfc5398cc307f3d6fbf5b52b4feb058e62255e4153f80957d0c2029c0d140d1ce28375b09f61179f329a4583f78aeeac39951da284d0b07459b0b1efa68b3a491370e4a899ed6aae32d97c", [[], [], []]}, 0x459) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x5, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4000, 0x0) ioctl$TIOCLINUX3(r5, 0x541c, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') 03:13:50 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0xf) [ 316.685960] atomic_op 00000000ceab4964 conn xmit_atomic (null) [ 316.713099] FAULT_INJECTION: forcing a failure. [ 316.713099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.724943] CPU: 0 PID: 11276 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 316.733177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.742545] Call Trace: [ 316.745591] dump_stack+0x244/0x39d [ 316.749261] ? dump_stack_print_info.cold.1+0x20/0x20 [ 316.754473] ? mark_held_locks+0x130/0x130 [ 316.758717] ? set_next_entity+0x485/0xc60 [ 316.758734] ? __lock_acquire+0x62f/0x4c20 [ 316.758756] should_fail.cold.4+0xa/0x17 [ 316.758776] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.758798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.767349] ? __perf_event_task_sched_out+0x33a/0x1bf0 [ 316.787324] ? mark_held_locks+0x130/0x130 [ 316.791584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.797144] ? zap_class+0x640/0x640 [ 316.800876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.800895] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 316.800919] ? find_held_lock+0x36/0x1c0 [ 316.815704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.821255] ? should_fail+0x22d/0xd01 [ 316.825154] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.825180] __alloc_pages_nodemask+0x34b/0xdd0 [ 316.825200] ? trace_hardirqs_on+0xbd/0x310 [ 316.839289] ? kasan_check_read+0x11/0x20 [ 316.843457] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 316.848575] ? compat_start_thread+0x80/0x80 [ 316.853006] ? find_held_lock+0x36/0x1c0 [ 316.857126] ? trace_hardirqs_off+0xb8/0x310 [ 316.861553] cache_grow_begin+0xa5/0x8c0 [ 316.865634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.871187] ? check_preemption_disabled+0x48/0x280 [ 316.876230] kmem_cache_alloc+0x66b/0x730 [ 316.876248] ? find_held_lock+0x36/0x1c0 [ 316.876271] getname_flags+0xd0/0x590 [ 316.876287] ? retint_kernel+0x2d/0x2d [ 316.876305] user_path_at_empty+0x2d/0x50 [ 316.892192] do_mount+0x180/0x1ff0 [ 316.899876] ? copy_mount_string+0x40/0x40 [ 316.904136] ? retint_kernel+0x2d/0x2d [ 316.908050] ? copy_mount_options+0x239/0x430 [ 316.912572] ? copy_mount_options+0x242/0x430 [ 316.917103] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.922655] ? copy_mount_options+0x315/0x430 [ 316.927178] ksys_mount+0x12d/0x140 [ 316.930830] __x64_sys_mount+0xbe/0x150 03:13:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) 03:13:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000280), &(0x7f00000002c0)=0x6) ioctl(r0, 0x100000000, &(0x7f00000003c0)="d2b9a3364a45c0f008618c4a017207174e967d15b7ed0808f6554fc76ccba44dc287d65c6cffb6dbaca0468a77d0dfa7ab83334a0df1646ddfc20bde46156aa94b1444335bb649a40806cfd50f172864f87ee9cf3c864ce8c754b8462e4e2ea04eaa81dbbbace993f51db999") r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2e7, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x1b, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000000c0)=0x8, 0x4) 03:13:50 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfff, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000000c0)={0xffff, 0x5, 0x3, 0x5}) 03:13:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x6, 0x2, 0x7b, 0x1}, {0x101, 0x6, 0x5, 0x10000}, {0x7f, 0x3, 0x115c, 0x9}, {0x7fff, 0x7fffffff, 0x5, 0xc1}, {0x6, 0x0, 0x100000000, 0xffffffffffffffdb}, {0x3a79f5b, 0x41, 0x3, 0x3}, {0x101, 0xd9, 0x6, 0x6}, {0x400000, 0x8, 0x80, 0x19b7937c}]}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000140)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000180)={r2, r3}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={"5450524f585900000000000000000000001e0000102600"}, &(0x7f0000000040)=0x1cd) [ 316.934825] do_syscall_64+0x1b9/0x820 [ 316.938723] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 316.944110] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.949052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.954006] ? trace_hardirqs_on_caller+0x310/0x310 [ 316.959033] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 316.964075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.964094] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.964115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.964140] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:13:50 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x10}, 0x10) rmdir(&(0x7f0000000200)='./file0/file1\x00') [ 316.964152] RIP: 0033:0x459fda [ 316.964170] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 316.964184] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 316.984750] RAX: ffffffffffffffda RBX: 00007f2403fd5b30 RCX: 0000000000459fda [ 316.984761] RDX: 00007f2403fd5ad0 RSI: 0000000020000080 RDI: 00007f2403fd5af0 [ 316.984771] RBP: 0000000020000080 R08: 00007f2403fd5b30 R09: 00007f2403fd5ad0 [ 316.984780] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 316.984789] R13: 0000000000100020 R14: 00000000004d8258 R15: 0000000000000003 [ 317.073234] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 03:13:50 executing program 2 (fault-call:2 fault-nth:30): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000600)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000280)={[{@data_err_ignore='data_err=ignore'}]}) 03:13:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:50 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200401, 0x0) connect$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x8001, 0x9, 0x289, 0x2, 0x7, 0x7ff}, 0x6}, 0xa) 03:13:50 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) chown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) rmdir(&(0x7f0000000200)='./file0/file1\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in6=@ipv4={[], [], @remote}, 0x4e21, 0xf1, 0x4e22, 0xaa, 0xa, 0x20, 0x80, 0x32, r3, r1}, {0x40, 0xfd9, 0x6, 0xffff, 0x0, 0xfffffffffffffffa, 0x9, 0x44}, {0x100000001, 0x7, 0x5}, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1}, {{@in6=@local, 0x4d6, 0xff}, 0xa, @in=@multicast1, 0x3505, 0x3, 0x2, 0x1, 0x100000000, 0x1, 0x9}}, 0xe8) 03:13:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) socket$inet6(0xa, 0x800, 0x1f) [ 317.169773] atomic_op 00000000d421ca49 conn xmit_atomic (null) 03:13:50 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x41, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='TPROXY\x00', 0xffffffffffffffff}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000180)={{0x8, 0x3, 0xffff, 0xffffffff, 'syz0\x00', 0x4}, 0x2, 0x30, 0x80, r2, 0x6, 0x10001, 'syz0\x00', &(0x7f0000000140)=['TPROXY\x00', 'TPROXY\x00', 'TPROXY\x00', '&wlan1\x00', 'cgroup*security\x00', 'TPROXY\x00'], 0x33, [], [0x8, 0x9, 0xbc, 0xc860]}) 03:13:50 executing program 1: socket$inet_dccp(0x2, 0x6, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = semget(0x1, 0x1, 0x208) socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000140)={0x9, 0x3, 0x11, "69b7f8ddea982c86d97d9799b9f063c0d1a0317e9961b5d209ecc53e26c5ea8fa07dd2337b6ab64f0fc2b4b6fa700c948c7758158d948d55bdeb3378", 0x3b, "6755e850a21fa561a0be2f42f14d1370af3772bd1c46c9ebb8ce0a7436b56ab01ad0185a9001beead8f21dad000ce4ea4544404f6933ed51b6e3ce18", 0x60}) semtimedop(r1, &(0x7f0000000080)=[{0x3, 0xff, 0x800}], 0x1, &(0x7f00000000c0)={0x77359400}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 03:13:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 03:13:50 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)={0x57a5, 0x11, 0x8, 0x63, 0x101, 0x96}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x4}}, 0x24, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) chown(&(0x7f0000000100)='./file0\x00', r1, r2) rmdir(&(0x7f00000000c0)='./file0/file1\x00') [ 317.284336] FAULT_INJECTION: forcing a failure. [ 317.284336] name failslab, interval 1, probability 0, space 0, times 0 [ 317.336999] CPU: 0 PID: 11312 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 317.344811] atomic_op 000000002ca6f2b3 conn xmit_atomic (null) [ 317.345321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.361504] Call Trace: [ 317.361529] dump_stack+0x244/0x39d [ 317.361549] ? dump_stack_print_info.cold.1+0x20/0x20 [ 317.361564] ? filename_lookup+0x39a/0x520 [ 317.361576] ? user_path_at_empty+0x40/0x50 [ 317.361591] ? do_mount+0x180/0x1ff0 [ 317.361611] ? ksys_mount+0x12d/0x140 [ 317.385628] ? do_syscall_64+0x1b9/0x820 [ 317.394136] should_fail.cold.4+0xa/0x17 [ 317.394156] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.394172] ? mntput+0x74/0xa0 [ 317.394197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.394223] ? check_preemption_disabled+0x48/0x280 [ 317.394249] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 317.403416] ? find_held_lock+0x36/0x1c0 [ 317.412295] ? tipc_node_unsubscribe+0x168/0x6a0 [ 317.431579] ? filename_lookup+0x39f/0x520 03:13:51 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = memfd_create(&(0x7f0000000080)='TPROXY\x00', 0x2) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000100)={0x7, 0x5aa4a3a8}) 03:13:51 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x29, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) [ 317.435831] ? perf_trace_sched_process_exec+0x860/0x860 [ 317.441305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 317.446863] __should_failslab+0x124/0x180 [ 317.451119] should_failslab+0x9/0x14 [ 317.454934] kmem_cache_alloc_trace+0x2d7/0x750 [ 317.459633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.465197] vfs_new_fs_context+0x5e/0x77c [ 317.469541] ? ns_capable_common+0x13f/0x170 [ 317.473971] do_mount+0xbfc/0x1ff0 [ 317.477531] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 317.483095] ? copy_mount_string+0x40/0x40 [ 317.483120] ? copy_mount_options+0x5f/0x430 [ 317.483138] ? kmem_cache_alloc_trace+0x353/0x750 [ 317.483158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.483175] ? _copy_from_user+0xdf/0x150 [ 317.483202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.496701] ? copy_mount_options+0x315/0x430 [ 317.496725] ksys_mount+0x12d/0x140 [ 317.496745] __x64_sys_mount+0xbe/0x150 [ 317.524085] do_syscall_64+0x1b9/0x820 [ 317.527994] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 317.533379] ? syscall_return_slowpath+0x5e0/0x5e0 [ 317.538322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.538345] ? trace_hardirqs_on_caller+0x310/0x310 [ 317.538363] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 317.538385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.548243] ? prepare_exit_to_usermode+0x291/0x3b0 [ 317.548268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.548298] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.573944] RIP: 0033:0x459fda [ 317.573964] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.596057] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.603796] RAX: ffffffffffffffda RBX: 00007f2403fd5b30 RCX: 0000000000459fda [ 317.611086] RDX: 00007f2403fd5ad0 RSI: 0000000020000080 RDI: 00007f2403fd5af0 [ 317.618370] RBP: 0000000020000080 R08: 00007f2403fd5b30 R09: 00007f2403fd5ad0 [ 317.625647] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 317.632923] R13: 0000000000100020 R14: 00000000004d8258 R15: 0000000000000003 [ 317.661460] kasan: CONFIG_KASAN_INLINE enabled [ 317.672868] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 317.692868] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 317.699127] CPU: 1 PID: 11312 Comm: syz-executor2 Not tainted 4.19.0-next-20181029+ #100 [ 317.707355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.716731] RIP: 0010:put_fs_context+0x31/0x5a0 [ 317.721411] Code: 56 41 55 41 54 53 48 89 fb 4c 8d ab 98 00 00 00 48 83 ec 18 e8 10 25 9f ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 03 05 00 00 4c 8b a3 98 00 00 00 4d 85 e4 74 66 [ 317.740316] RSP: 0018:ffff880185fc7bd8 EFLAGS: 00010207 [ 317.745681] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90006589000 [ 317.752957] RDX: 0000000000000011 RSI: ffffffff81e04360 RDI: fffffffffffffff4 [ 317.760233] RBP: ffff880185fc7c18 R08: ffff88018794a0c0 R09: ffffed003b5c5b67 [ 317.767505] R10: ffffed003b5c5b67 R11: ffff8801dae2db3b R12: ffff88018a98aa30 [ 317.774781] R13: 000000000000008c R14: ffff8801c92aa4c0 R15: ffff880181118800 [ 317.782061] FS: 00007f2403fd6700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 317.790302] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.796188] CR2: 00000000004cd4b8 CR3: 00000001c0995000 CR4: 00000000001406e0 [ 317.803461] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 317.810739] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 317.818005] Call Trace: [ 317.820607] ? ns_capable_common+0x13f/0x170 [ 317.825030] do_mount+0xda4/0x1ff0 [ 317.828590] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 317.834136] ? copy_mount_string+0x40/0x40 [ 317.838380] ? copy_mount_options+0x5f/0x430 [ 317.842795] ? kmem_cache_alloc_trace+0x353/0x750 [ 317.847651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.853195] ? _copy_from_user+0xdf/0x150 [ 317.857359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.862907] ? copy_mount_options+0x315/0x430 [ 317.867413] ksys_mount+0x12d/0x140 [ 317.871062] __x64_sys_mount+0xbe/0x150 [ 317.875053] do_syscall_64+0x1b9/0x820 [ 317.878960] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 317.884333] ? syscall_return_slowpath+0x5e0/0x5e0 [ 317.889273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.894126] ? trace_hardirqs_on_caller+0x310/0x310 [ 317.899152] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 317.904178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.909728] ? prepare_exit_to_usermode+0x291/0x3b0 [ 317.914754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.919610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.924801] RIP: 0033:0x459fda [ 317.928001] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 317.946905] RSP: 002b:00007f2403fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 317.954620] RAX: ffffffffffffffda RBX: 00007f2403fd5b30 RCX: 0000000000459fda [ 317.961890] RDX: 00007f2403fd5ad0 RSI: 0000000020000080 RDI: 00007f2403fd5af0 [ 317.969167] RBP: 0000000020000080 R08: 00007f2403fd5b30 R09: 00007f2403fd5ad0 [ 317.976454] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 317.983728] R13: 0000000000100020 R14: 00000000004d8258 R15: 0000000000000003 [ 317.991010] Modules linked in: [ 317.996375] kobject: 'loop4' (00000000bdb4dc61): kobject_uevent_env [ 318.003426] ---[ end trace 31ac06bc26db5423 ]--- [ 318.005333] kobject: 'loop4' (00000000bdb4dc61): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 318.008246] RIP: 0010:put_fs_context+0x31/0x5a0 [ 318.018277] kobject: 'loop0' (000000000a651dab): kobject_uevent_env [ 318.023127] Code: 56 41 55 41 54 53 48 89 fb 4c 8d ab 98 00 00 00 48 83 ec 18 e8 10 25 9f ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 03 05 00 00 4c 8b a3 98 00 00 00 4d 85 e4 74 66 [ 318.028927] kobject: 'loop0' (000000000a651dab): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 318.048095] RSP: 0018:ffff880185fc7bd8 EFLAGS: 00010207 [ 318.059706] kobject: 'loop2' (00000000f33d20e2): kobject_uevent_env [ 318.069278] kobject: 'loop2' (00000000f33d20e2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 318.070339] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90006589000 [ 318.086323] RDX: 0000000000000011 RSI: ffffffff81e04360 RDI: fffffffffffffff4 [ 318.093858] RBP: ffff880185fc7c18 R08: ffff88018794a0c0 R09: ffffed003b5c5b67 [ 318.101750] R10: ffffed003b5c5b67 R11: ffff8801dae2db3b R12: ffff88018a98aa30 [ 318.109332] R13: 000000000000008c R14: ffff8801c92aa4c0 R15: ffff880181118800 [ 318.116854] FS: 00007f2403fd6700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 318.125357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 318.131249] CR2: 0000000000707158 CR3: 00000001c0995000 CR4: 00000000001406e0 [ 318.138795] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 318.146355] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 318.153931] Kernel panic - not syncing: Fatal exception [ 318.160313] Kernel Offset: disabled [ 318.163938] Rebooting in 86400 seconds..