6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:40 executing program 2: socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="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", 0x123}, {&(0x7f00000001c0)="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", 0xfe}, {&(0x7f0000000600)="40102df225207e0d629c3b1bd8070d10fd4f79700c4640cef8adf4", 0x1b}, {&(0x7f0000000300)="5ac7a5788603c99d5245d48bb1113ef359b444e123317b7e1b7d32bc02ac161a3e3dec4b94", 0x25}, {&(0x7f0000000340)="ab11c2cdd77f4bfdb59428e90c464f6d13b50429980382b8c75dc888e33fed41e9fd14a2207209e5bd5ef40258aad5e6e8b9790d7eb74bcef4a2eff97ec3bfdd3e5470616bdab870d7b6040000003175d000e2fda5323a813f93ec2bcb5c25ad0f91a393962ba3de8c65b82737ad3360e2b1b4331c23163a367c35cfff46a68392d4ccbde01db8686cdefdfe9ed7476fafcdbadb7cf105953c19d21bc5171c9aad992064000000000000000000000000", 0xb0}, {&(0x7f0000000400)="9324eedbc44455214e118b408db6542c89ea27df7cba18ce220b01d2e03c077ceb5bd4fb0994d96fced2", 0x2a}], 0x6, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:40 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) listen(r0, 0x180000000000000) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:40 executing program 2: socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="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", 0x123}, {&(0x7f00000001c0)="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", 0xfe}, {&(0x7f0000000600)="40102df225207e0d629c3b1bd8070d10fd4f79700c4640cef8adf4", 0x1b}, {&(0x7f0000000300)="5ac7a5788603c99d5245d48bb1113ef359b444e123317b7e1b7d32bc02ac161a3e3dec4b94", 0x25}, {&(0x7f0000000340)="ab11c2cdd77f4bfdb59428e90c464f6d13b50429980382b8c75dc888e33fed41e9fd14a2207209e5bd5ef40258aad5e6e8b9790d7eb74bcef4a2eff97ec3bfdd3e5470616bdab870d7b6040000003175d000e2fda5323a813f93ec2bcb5c25ad0f91a393962ba3de8c65b82737ad3360e2b1b4331c23163a367c35cfff46a68392d4ccbde01db8686cdefdfe9ed7476fafcdbadb7cf105953c19d21bc5171c9aad992064000000000000000000000000", 0xb0}, {&(0x7f0000000400)="9324eedbc44455214e118b408db6542c89ea27df7cba18ce220b01d2e03c077ceb5bd4fb0994d96fced2", 0x2a}], 0x6, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:41 executing program 0: r0 = socket$inet(0x2, 0x807, 0x20000000002) accept4(r0, 0x0, &(0x7f00000002c0), 0x800) socketpair(0xf, 0x3, 0x4, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000340)={r0}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) connect$rds(r2, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0xfffffe0e) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0x170, r3, 0x700, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}]}, @TIPC_NLA_LINK={0xdc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdb4000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x40}, 0x840) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1f, 0x77, 0x101, 0x41e4e4aa, 0x1, 0xffffffffffffffff, 0xffffffff}, 0x2c) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@sha1={0x1, "5dac2e4d19fd33a2ea35c4dbcc73b81d36f1729b"}, 0x15, 0x1) 12:12:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:41 executing program 2: socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="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", 0x123}, {&(0x7f00000001c0)="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", 0xfe}, {&(0x7f0000000600)="40102df225207e0d629c3b1bd8070d10fd4f79700c4640cef8adf4", 0x1b}, {&(0x7f0000000300)="5ac7a5788603c99d5245d48bb1113ef359b444e123317b7e1b7d32bc02ac161a3e3dec4b94", 0x25}, {&(0x7f0000000340)="ab11c2cdd77f4bfdb59428e90c464f6d13b50429980382b8c75dc888e33fed41e9fd14a2207209e5bd5ef40258aad5e6e8b9790d7eb74bcef4a2eff97ec3bfdd3e5470616bdab870d7b6040000003175d000e2fda5323a813f93ec2bcb5c25ad0f91a393962ba3de8c65b82737ad3360e2b1b4331c23163a367c35cfff46a68392d4ccbde01db8686cdefdfe9ed7476fafcdbadb7cf105953c19d21bc5171c9aad992064000000000000000000000000", 0xb0}, {&(0x7f0000000400)="9324eedbc44455214e118b408db6542c89ea27df7cba18ce220b01d2e03c077ceb5bd4fb0994d96fced2", 0x2a}], 0x6, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:41 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, 0x0, 0x4000010) 12:12:41 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)={0x40000001}) 12:12:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2729.241765][ T26] kauditd_printk_skb: 25 callbacks suppressed [ 2729.241780][ T26] audit: type=1800 audit(1553170361.513:1483): pid=3050 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=281 res=0 12:12:41 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, 0x0, 0x4000010) [ 2729.406695][ T26] audit: type=1804 audit(1553170361.573:1484): pid=3050 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5148/file0/file0" dev="loop5" ino=281 res=1 12:12:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x10000) [ 2729.682492][ T26] audit: type=1800 audit(1553170361.583:1485): pid=3050 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=281 res=0 12:12:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:42 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x3ff, 0x800) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000200)) socketpair(0x0, 0xa, 0x400, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x100000000805, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8600, 0x0) bind$rxrpc(r3, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x24) connect$rds(r2, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) ioctl$sock_ifreq(r1, 0x89ff, &(0x7f0000000180)={'erspan0\x00', @ifru_settings={0xfffffffffffffffb, 0x7, @raw_hdlc=&(0x7f0000000140)={0x4, 0x9}}}) fsetxattr$security_capability(r2, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x564d8fe2, 0x200}]}, 0xc, 0x0) 12:12:42 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, 0x0, 0x4000010) 12:12:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:42 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:42 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6b00, 0x0) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x9}}, 0x18) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000100)={0x0, 0x0, 0x103, 0x4, {0x8, 0x1, 0x1, 0x3ff}}) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:42 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) 12:12:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:42 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:42 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x400, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000004c0)={0x0, 0x19b2}, 0x2) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) r2 = socket$inet(0x2, 0x80000000802, 0x1) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') connect$rds(r2, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) read(r2, &(0x7f0000000280)=""/176, 0xb0) pselect6(0x40, &(0x7f0000000100)={0x6, 0x7fff, 0x1f, 0x40, 0x22a5, 0x400, 0x401, 0x20}, &(0x7f0000000140)={0xfffffffffffff801, 0x4, 0xcb3, 0x2e, 0x1, 0x6, 0x1, 0x7}, &(0x7f0000000180)={0xd8a6, 0x5, 0x0, 0x8000, 0x16d13503, 0x9, 0x3, 0x9}, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240)={&(0x7f0000000200)={0x3}, 0x8}) fcntl$setflags(r2, 0x2, 0x1) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0xdd7) preadv(r1, &(0x7f0000000840)=[{&(0x7f0000000540)=""/203, 0xcb}, {&(0x7f0000000640)=""/123, 0x7b}, {&(0x7f0000000700)=""/130, 0x82}, {&(0x7f00000007c0)=""/73, 0x49}], 0x4, 0x0) 12:12:42 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="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", 0x123}, {&(0x7f00000001c0)="68153d20c5a82d6bfd42b3c8f39aaaa814c05e0713b2bdacacbb0c507272041a5667806569cff008cc729c98c9821f87c48d96b0cbd0f33be1125960e0a9c3c7f2031c6b8096761f75f06f8c6a8a5d312b7569592a5f4eea780f926ab6a613b0728fc0d422b137eb08e6fde7291b2fb3ced7dcd7f7c29f463c772158cdc746692acdc3db8f699289d1fc46089c83b80b476443887fe9c1f37058b567335a96648bde5b0ebc5a893e0f71d3dbb84315b4be55e15bfd28d2fea134145415f69c90804b17d22b98b59a34a1f6a924357283ce646a7d3efb3fa325d1f7ef75acea2889fc63251c8b210fa20ffacc89c435bd07876137b14de2a261e07ae7caf4", 0xfe}, {&(0x7f0000000600)="40102df225207e0d629c3b1bd8070d10fd4f79700c4640cef8adf4", 0x1b}, {&(0x7f0000000300)="5ac7a5788603c99d5245d48bb1113ef359b444e123317b7e1b7d32bc02ac161a3e3dec4b94", 0x25}, {&(0x7f0000000340)="ab11c2cdd77f4bfdb59428e90c464f6d13b50429980382b8c75dc888e33fed41e9fd14a2207209e5bd5ef40258aad5e6e8b9790d7eb74bcef4a2eff97ec3bfdd3e5470616bdab870d7b6040000003175d000e2fda5323a813f93ec2bcb5c25ad0f91a393962ba3de8c65b82737ad3360e2b1b4331c23163a367c35cfff46a68392d4ccbde01db8686cdefdfe9ed7476fafcdbadb7cf105953c19d21bc5171c9aad992064000000000000000000000000", 0xb0}], 0x5, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6b00, 0x0) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x9}}, 0x18) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000100)={0x0, 0x0, 0x103, 0x4, {0x8, 0x1, 0x1, 0x3ff}}) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:43 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="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", 0x123}, {&(0x7f00000001c0)="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", 0xfe}, {&(0x7f0000000600)="40102df225207e0d629c3b1bd8070d10fd4f79700c4640cef8adf4", 0x1b}, {&(0x7f0000000300)="5ac7a5788603c99d5245d48bb1113ef359b444e123317b7e1b7d32bc02ac161a3e3dec4b94", 0x25}], 0x4, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:43 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000040)=""/30, 0xa000, 0x1000, 0x100}, 0x18) 12:12:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:43 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6b00, 0x0) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x9}}, 0x18) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000100)={0x0, 0x0, 0x103, 0x4, {0x8, 0x1, 0x1, 0x3ff}}) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:43 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83c67534d9c92b53790b4402000000000000002a5d6fdbee939e497304d914cd87842a2151000f971ac7af538e40d4b1caa9703f1587194cb3e2fad4dfba1b896e89be98e0308ccb5ed182b814bb678186da6e4929a8bd580000003a0a6b0100000001000000edc7cd04431a91108efc972aab879a141349ca9c9e5b1dfad0c0c88e9c7d288b08a7946cf60f890b57a450fb7093456e4987c29efacc098213fc67568fdc63c104ef960946021acfef988fae4cd7a76cc896af37a7a3722a570823df73a6b0054c68048f829a367c4b395d3e2eea68809ee1062fa14da4b76c15ddfe250f90477fd7f844ec0dcd7129000000000000000000009ee01665563ca64435f3f1017f8526503ae0269582bcef52c37ea8bc4deb5ff9db08dfff4dad5c000000", 0x123}, {&(0x7f00000001c0)="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", 0xfe}, {&(0x7f0000000600)="40102df225207e0d629c3b1bd8070d10fd4f79700c4640cef8adf4", 0x1b}], 0x3, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="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", 0x123}, {&(0x7f00000001c0)="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", 0xfe}], 0x2, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6b00, 0x0) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x9}}, 0x18) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, &(0x7f0000000100)={0x0, 0x0, 0x103, 0x4, {0x8, 0x1, 0x1, 0x3ff}}) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:43 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x5}, 0x7) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:43 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="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", 0x123}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:43 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6b00, 0x0) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x9}}, 0x18) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:43 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6b00, 0x0) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:43 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8042, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000182}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x320, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x800) r2 = socket$inet(0x2, 0x100000000806, 0xffffffffffffff07) connect$rds(r2, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:44 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:44 executing program 0: r0 = socket$inet(0x2, 0x80000, 0x1) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f00000000c0)=0x78) r1 = socket$inet(0x2, 0x100000000805, 0x800) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:44 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x800) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:44 executing program 0: connect$rds(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000240)) splice(r0, &(0x7f00000001c0), r2, &(0x7f0000000200), 0x8, 0x0) 12:12:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:44 executing program 0: delete_module(&(0x7f0000000080)='\\vboxnet0*trustedsecurity,vmnet1user+]}\x00', 0x200) r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast1, @remote}, &(0x7f0000000040)=0xc) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20a0000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x148, r3, 0x20, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x12c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffc00}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x20044004}, 0x800) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000180)=0x4) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000200), 0x8, 0x0) 12:12:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:44 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000200), 0x8, 0x0) 12:12:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:45 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x200) bind$isdn_base(r1, &(0x7f0000000040)={0x22, 0x3b, 0x9, 0xfffffffffffffff8, 0xf2a}, 0x6) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) getpeername$netrom(r1, &(0x7f0000000100)={{0x3, @netrom}, [@netrom, @remote, @rose, @netrom, @default, @default, @netrom, @rose]}, &(0x7f0000000180)=0x48) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000001c0)=[@window={0x3, 0x2e93, 0x1ff}, @mss={0x2, 0x7}, @sack_perm], 0x3) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000080)={{0x2, 0x4e20, @rand_addr=0xffff}, {0x1, @remote}, 0x60, {0x2, 0x4e22, @multicast2}, 'vlan0\x00'}) 12:12:45 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) splice(r0, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) splice(r0, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000040)={0x5e4b}) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) sendto(r0, &(0x7f0000000080)="5ad43e4d39b576f55b6fe74999934816a20642b8a4aedec3f72983d8c222eecd745c3cbd491a3dc588b2994f334fedd46cf23f43152722cc875badc5d1", 0x3d, 0x810, &(0x7f00000000c0)=@generic={0x8, "890e4daaed01577d60ac6b08776e4a0c8947c8880519cb6253175f92b16f69650c8c26319a54aa19a77d43034e1c2650058c032c1614c15fb210aea7158916cd3d3f23fb768be8935dbfed5fa3e6168937c0d65c193e280e6a7193bda56cd1a5ae897d27084d9506f4dc5ed242141ee2a64b0fa3659b9a12e16c7e718df2"}, 0x80) sendmsg$xdp(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="4e9952d98a20a568742909174b8c0f13d8a65b650efff5d9f275eaad0e94e692523e5e6a72", 0x25}, {&(0x7f0000000180)="dfe41f1c23d4702b4246b09e9d7def1ee67859603604f84510344444ce9cf4db076f5a70baa3a4a43f9d5d58e08acd7fc5a2ab6046ce649054d853b5909e417a77ff41a4ec90e80f19c1b09a479fd5eae7579aa847a6f011848559ffce47b6db2db3de112bb52cc1081045a053cf3bfd0ff7b4f3c55e59", 0x77}, {&(0x7f0000000200)="eeb4d944bad87cb0053b637fb763b457d9db497c97b777f82e1afe2ef86cb3b5b698884990312f52cc191f171ad549004e7553a2bd1310849d6c413e9c8ce750f162a596e021de777c68a180627a8a0006a17f8db5a295e1c3f81e336da4fad7239985051496a10c0a4af3eeb54ebd19f774b8e38fb5f3f00693b923cc643e53024c07dc07", 0x85}, {&(0x7f00000002c0)="f3807aeabbf660bd69ad414bf0151c95c17b74554eaa5f7ce6dda246195a4796356b0a5d549faae2a0990ceebd87412242af9bdfe328aaef719214d2756c4139fb79b64cc15c8c1e98a8b0849afde4c64ca8173a88ab160384b0d7a1731337210c119ea316d85b1e19a215714df894d162bdd423dfaf99cb32336ec72c78ba5811f1b84d10f20cd0d5db8945", 0x8c}, {&(0x7f0000000380)="92d72707ebda642985ef7cc190ac7bf43beb1523f8741af6c10360", 0x1b}, {&(0x7f00000003c0)="0d92dbbed5918e61265f90c8d77a6c6e206728e3301eb1a80199747623fdfa40f9c85bbb7fb6bea6b380160332b8934e1454a6906b0da7493ae239fb1f1011eda8f361fa6aeeda043e857ef0538df60b9e206583c33825f47113c7d12a5455710d63a8eac6c38e099e9daccc0c13dce602f689133209678542efd1714ca17630e7494b493348a182a239fcbc2ab9b25731b04a398d3cabf3bccf05557f910aac", 0xa0}, {&(0x7f0000000480)="e6090e9cdf149beb890a2263fb7ae203e26f7c8865cbf1c6a2212dc7c0598c9182421697e8270da063e73e0a", 0x2c}], 0x7, 0x0, 0x0, 0x80}, 0x24000800) 12:12:45 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) splice(r0, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:45 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83c67534d9c92b53790b4402000000000000002a5d6fdbee939e497304d914cd87842a2151000f971ac7af538e40d4b1caa9703f1587194cb3e2fad4dfba1b896e89be98e0308ccb5ed182b814bb678186da6e4929a8bd580000003a0a6b0100000001000000edc7cd04431a91108efc972aab879a141349ca9c9e5b1dfad0c0c88e9c7d288b08a7946cf60f890b57a450fb", 0x92}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:45 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x8, 0x0) 12:12:45 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f0000000000)={0x2, 0x20000000, @initdev={0xa}}, 0x10) 12:12:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:45 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:45 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x8, 0x0) 12:12:45 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000040)) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) 12:12:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x8, 0x0) 12:12:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)}], 0x1, &(0x7f00000007c0)=[@sndinfo={0x20, 0x84, 0x2, {0x80, 0x2, 0x1f, 0x6}}], 0x20, 0x80}, 0x4000010) 12:12:46 executing program 0: socket$netlink(0x10, 0x3, 0x1f) r0 = semget$private(0x0, 0x3, 0x4) semtimedop(r0, &(0x7f0000000000)=[{0x3, 0x8, 0x800}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}) connect$rds(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000200), 0x8, 0x0) 12:12:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1, 0x0, 0x0, 0x80}, 0x4000010) 12:12:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000200), 0x8, 0x0) 12:12:46 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) sendto$rxrpc(r1, &(0x7f0000000040)="b1dcc2052a76c035764f84df108c462509939fa34e4b99c87e7ce4ba813266760b8019126bf751b50dd2f453953d21fdef40bc3070740d49684a22b7def3b00810320fd2525c5b997978f3d5ac61f3c9933fd10498ca561379170fa47f57c5ca33c547d7a34468472107f0c1fc8c9f6a36920aad396fd6fc918e77aa9dddfc44a1710ebf8939e533a7872a15e06fa381796b83640836ea15c8a57545054dff409b10f7aa89f7d78eaab3b6dfa083d6d2ec6617b9f2d642f535f99f242ec20c6a6de9356ad89fe2d32d24d6280dd5f79f6a7a165c", 0xd4, 0x4c004, 0x0, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 3: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1, 0x0, 0x0, 0x80}, 0x4000010) 12:12:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:46 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, &(0x7f00000001c0), r1, &(0x7f0000000200), 0x8, 0x0) 12:12:46 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1, 0x0, 0x0, 0x80}, 0x4000010) 12:12:47 executing program 3: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x100000000805, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r0, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8740, 0x0) socket$xdp(0x2c, 0x3, 0x0) write$9p(r0, &(0x7f0000000700)="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", 0x1000) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@null=' \x00', 0x0, 'irlan0\x00'}) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1}, 0x4000010) 12:12:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(0x0) splice(r0, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:47 executing program 3: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1}, 0x4000010) 12:12:47 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(0x0) splice(r0, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000440)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000480)=0x18) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000180)="e86c52ab649cb96ab1a6f8adfdefa2a6371f18dda1b091800d3749f3b036194d2f6c118bdb97af1f107cbfebf9820b78b0b70019020b44642453d9b2208bad57c04efabc1135ba8aae36d698c90042ea899135c2aeb698c06123272341901f799a939b4495ffce1217a341fe555c462a9dec5a95c5b6faf9cf46c6f55f9d9b981f7c1de1ff962d125c714636dd1e3e54381f0a53dcefcdb7d99431c8e4f6c16bfc0ed64690592b5b9923d355b9e830c77cf728c019a7f902", 0xb8}, {&(0x7f0000000240)="42337685f0ecff59162d32773818fcda3fc60e8ac39b98dc1a7370eacafeaa90a6887f43c95f23d33d1d0baaeafb59f4862f4153c34802a60728baff69fb054a92747f00b12747d02cf6e5b92e7e5a7b9b22e6f8a17167c8df0a6db5c2661a0f0756f45948fe1d1a76e4f89df8b20497b70bba37442e2c52525d7b50e5e00c09bf475a6d729610791060ee9d8a094a4f322ac2c40002b844c31b03306f4fffe46c3c470ff3b38576706d9f375e", 0xad}, {&(0x7f0000000300)="1d65e72c71c5cef9f8f34a0c3136ba2dc9ffb6cc1e88d502cb770968a7d38a1f0f037dcb2331ea104b7744a70398fb18015b6904e789e625d82b7540fa541f99419c5b352656e8ce1d4b3882432f1882ab86abbf93786cef39e964c9455471ac106056fcd3fbe7fac49eb1b83f9e47efbc144d", 0x73}, {&(0x7f0000000380)="89bd14bcde73d85b", 0x8}], 0x4, 0x0, 0x0, 0xc090}], 0x1, 0x80000004000010) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/156) 12:12:47 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1}, 0x4000010) 12:12:47 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(0x0) splice(r0, &(0x7f00000001c0), 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:47 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 5: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x8, 0x0) 12:12:47 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1, 0x0, 0x0, 0x80}, 0x0) 12:12:47 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 0: connect$rds(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @initdev={0xa}}, 0xffffffffffffffd7) 12:12:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 5: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x8, 0x0) 12:12:47 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1, 0x0, 0x0, 0x80}, 0x0) 12:12:47 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:47 executing program 5: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x8, 0x0) 12:12:48 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x1) fcntl$setsig(r0, 0xa, 0x9) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x3, @multicast2}, 0x1a5) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000080)={r2, 0x20}) 12:12:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 2: r0 = socket$inet(0x2, 0x100000000805, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000800)="83", 0x1}], 0x1, 0x0, 0x0, 0x80}, 0x0) 12:12:48 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:12:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6f9, 0x80000200000) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r1, &(0x7f0000000080)={0x2, 0xfffffffffffffffc, @multicast1}, 0xfffffffffffffd80) timer_create(0x4, &(0x7f0000000280)={0x0, 0xf, 0x0, @thr={&(0x7f00000000c0)="53a2576b12dd9a0389964c6c8c7d9418055a7835328f799c4f92236139eb0fad374acc94be549c875b0917d017c7f2f0423704ff180af2318880848f04e077583bbb21f40f4d3aca66aeb93c6f5155e83100a3c670bb5f4f758ff9e9a3dcd114313905741108d6488e0da218acabe4a06f7c6fa28d9802679fa465572f87d372660eeb1435346e161697d5fb255002d6b527eb632e414611bef7d24a2d9f6ade8bc363883028b750e187492ab7b4ec81b87dc58d4f994ff4734677d84adf67015fb2d745b6efc225b0a11f551fdbd02911920713ef2f1574c622", &(0x7f00000001c0)="99a7c1fe2d999db3ea1fae294b8153143a158ed4eb5e33829e78be588b3123ab2a6a89791f1f0660633f3f02cf5c10c8e7d936de3a2b3d90eb090f4384eb6b05ce1aef4d2bb060034fdab21e93c13be3e472ba6ccac33884f73e0151a15e897d272749ed1532ecfadda8a4e9c71fcb7fc0f5c57787c3abb2230a193e3e0a6eeb91954364585cebafb3e097d9b3f58f3f67e3"}}, &(0x7f00000002c0)=0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x19) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000003c0)=0x8, 0x4) clock_gettime(0x0, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000480)) timer_settime(r2, 0x21, &(0x7f0000000580)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000500)) 12:12:48 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2736.091217][ T26] audit: type=1800 audit(1553170368.363:1486): pid=6596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16979 res=0 12:12:48 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)) splice(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2736.245358][ T26] audit: type=1804 audit(1553170368.433:1487): pid=6596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir125005355/syzkaller.FA6We3/5132/file0" dev="sda1" ino=16979 res=1 12:12:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:48 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)) splice(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:48 executing program 0: r0 = socket$inet(0x2, 0x6, 0x1) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) [ 2736.458484][ T26] audit: type=1800 audit(1553170368.443:1488): pid=6596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16979 res=0 12:12:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:49 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)) splice(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:12:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:49 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) connect$rds(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xa}}, 0x10) pause() 12:12:49 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 12:12:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2737.026634][ T26] audit: type=1800 audit(1553170369.303:1489): pid=6850 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17121 res=0 12:12:49 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 12:12:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2737.146914][ T26] audit: type=1804 audit(1553170369.353:1490): pid=6850 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir125005355/syzkaller.FA6We3/5133/file0" dev="sda1" ino=17121 res=1 [ 2737.324749][ T26] audit: type=1800 audit(1553170369.353:1491): pid=6850 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17121 res=0 12:12:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000580)=@caif, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x10000) 12:12:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 12:12:50 executing program 1: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2040, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x2, 0x7, 0x8, 0x3, r1}) 12:12:50 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x0, 0x0) 12:12:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2737.908383][ T26] audit: type=1800 audit(1553170370.183:1492): pid=6983 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17329 res=0 12:12:50 executing program 1: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x0, 0x0) [ 2738.087113][ T26] audit: type=1804 audit(1553170370.243:1493): pid=6983 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir125005355/syzkaller.FA6We3/5134/file0" dev="sda1" ino=17329 res=1 12:12:50 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @empty}, 0xfffffffffffffd99) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @local}}}, 0x84) [ 2738.200704][ T26] audit: type=1800 audit(1553170370.243:1494): pid=6983 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17329 res=0 12:12:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x0, 0x0) 12:12:50 executing program 1: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:50 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x141000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) r1 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xfc, r3, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xaba}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6d54}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff939}]}, 0xfc}, 0x1, 0x0, 0x0, 0x8000}, 0x4048000) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000000c0)=""/2) 12:12:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:51 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2738.852583][ T26] audit: type=1800 audit(1553170371.123:1495): pid=7241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17635 res=0 12:12:51 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8ffc41525964da8f, 0x0) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000040)='\x00', 0x1) fallocate(r0, 0x6, 0x9, 0x0) r2 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r2, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:51 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:51 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@dev, @in=@remote}}, {{@in6=@mcast2}}}, &(0x7f0000000100)=0xe8) 12:12:51 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() ioctl$UI_DEV_CREATE(r1, 0x5501) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000700)=ANY=[@ANYBLOB="8802000000000000040000000000000003000000000000000200000000000000f9ffffffffffffff0700000000000000070000000000000004000000000000003f0000000000000055e800000000000002000000000000000000008000000000430000000000000009000000ff7f00003f0000000300000003000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="4000000004000000000000000500000000000000ffffffff00000000000000000000000000000000000000040000002a0000000000000004000000dfa20000050000000000000008000000000000000600000000000000ff0f00000000000000000000000000000300000000000000000000003f000000070000003f00000005000000", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0080000006000000000000000300000000000000090000000000000001000000020000003a00000000000000000000000000000003000000000000000400000000000000040000000000000006000000060000000500000000000000010000000000000082d000000000000004000000000000000300000000000000010000000000000001000100000200000800000000000000ff010000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="ff7f000003000000000000000300000000000000ac390000000000000b000000000000006b657972696e6770726f630000000000030000000000000002000000000000000200000000000000020000000000000008000000020000000600000000000000150000000000000009000000000000007f00000000000000080000000000000007000000000000000000000000000000fffbffff2c08000000000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="050000000100000000000000000000000000000009000000000000000000000000800000"], 0x288) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xd, 0x1000, &(0x7f0000000040)="84003f6ade5acb29edd8cf2cab", &(0x7f0000000700)=""/4096, 0x1}, 0x28) 12:12:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='ramfs\x00', 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:12:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = dup(r0) ioctl$RTC_VL_CLR(r1, 0x7014) 12:12:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:12:53 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0xc3) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000080)={0x3, 0x8}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x4, 0x5b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000700], 0x0, &(0x7f0000000000), &(0x7f0000000700)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x50, 0xf5, 'ip6_vti0\x00', 'ip6_vti0\x00', 'ip_vti0\x00', '\x00', @link_local, [0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0xff], 0x150, 0x150, 0x180, [@physdev={'physdev\x00', 0x70, {{'ip6_vti0\x00', {0xff}, 'syzkaller1\x00', {0xff}, 0x12, 0x3}}}, @ip={'ip\x00', 0x20, {{@remote, @loopback, 0xff000000, 0x0, 0x5, 0x0, 0x4, 0x1, 0x4e20, 0x4e23, 0x4e23, 0x4e23}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x7, 0x8, 0xe8ff, 'vxcan1\x00', 'bridge_slave_0\x00', 'team_slave_1\x00', 'eql\x00', @dev={[], 0x1f}, [0xff, 0x0, 0xff, 0xff], @random="1fa2cf3ee920", [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x100, 0x130, 0x160, [@devgroup={'devgroup\x00', 0x18, {{0xd, 0x7fff, 0x7, 0x400, 0x2}}}, @helper={'helper\x00', 0x28, {{0x1, 'irc-20000\x00'}}}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x401}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x0, 0x20, 0x892f, 'ipddp0\x00', 'syz_tun\x00', 'veth0_to_bridge\x00', '\x00', @dev={[], 0x23}, [0xff, 0xff, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0x0, 0xff], 0x70, 0xa8, 0xf8}, [@common=@dnat={'dnat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0xfffffffffffffffc}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x0, 0x2, 0x3}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x15, 0x10, 0x8, 'veth1\x00', 'team_slave_1\x00', 'erspan0\x00', 'sit0\x00', @empty, [0x0, 0xff], @empty, [0x0, 0x0, 0xff, 0x0, 0xff], 0xa0, 0x108, 0x150, [@cpu={'cpu\x00', 0x8}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xdcf4}}}, @common=@dnat={'dnat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"74a370152ea2ff4e53a2dd63c38d959058a64926ac782dae4f72801b5696"}}}]}]}, 0x630) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, 0xc) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:iptables_initrc_exec_t:s0\x00', 0x2c) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x4e23, @initdev={0xa}}, 0x10) 12:12:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2741.819887][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 2741.819902][ T26] audit: type=1800 audit(1553170374.093:1513): pid=8284 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=285 res=0 12:12:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) 12:12:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2741.923815][ T26] audit: type=1804 audit(1553170374.133:1514): pid=8284 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5190/file0/file0" dev="loop5" ino=285 res=1 12:12:54 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x688400, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x1, 0x0, {0x3, 0x100, 0x2012, 0xb, 0xd, 0x7, 0x3}}) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x7, 0x4) 12:12:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2741.983080][ T26] audit: type=1800 audit(1553170374.133:1515): pid=8284 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=285 res=0 12:12:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x200000, @initdev={0xa}}, 0x10) [ 2742.319370][ T26] audit: type=1800 audit(1553170374.593:1516): pid=8541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17393 res=0 12:12:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) 12:12:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2742.460001][ T26] audit: type=1804 audit(1553170374.633:1517): pid=8541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5191/file0/file0" dev="sda1" ino=17393 res=1 12:12:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:54 executing program 0: r0 = socket$inet(0x2, 0x108000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2742.715023][ T26] audit: type=1800 audit(1553170374.633:1518): pid=8541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17393 res=0 12:12:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) 12:12:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x410002, 0x1) linkat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) 12:12:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2742.919520][ T26] audit: type=1800 audit(1553170374.993:1519): pid=8883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17701 res=0 12:12:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2743.045449][ T26] audit: type=1804 audit(1553170375.023:1520): pid=8883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5192/file0/file0" dev="sda1" ino=17701 res=1 12:12:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2743.092099][ T26] audit: type=1800 audit(1553170375.023:1521): pid=8883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17701 res=0 12:12:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/mls\x00', 0x0, 0x0) bind(r0, &(0x7f00000004c0)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80) r1 = socket$inet(0x2, 0x100000000805, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e21, 0x2, 0x4e22, 0x2, 0x2, 0xa0, 0x20, 0x0, r2, r3}, {0x7fff, 0x180000000000, 0x7fffffff, 0x165d, 0x80, 0x7f, 0x0, 0x2}, {0xc5, 0x9, 0x4, 0x1ff}, 0x8, 0x6e6bb2, 0x1, 0x1, 0x0, 0x3}, {{@in=@local, 0x4d4, 0xff}, 0xa, @in6=@remote, 0x3500, 0x1, 0x0, 0x1, 0x9, 0x0, 0x10000}}, 0xe8) r4 = socket(0x9, 0x4, 0x100000001) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={0x0, 0x401}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000400)={0x2, 0x8, 0x1de278de, 0x4, r5}, &(0x7f0000000440)=0x10) r6 = openat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0, 0x100) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000140)={0x57, 0xfffffffffffffff7, 0x2a, {0x100000000, 0x7}, {0xa5, 0x40}, @period={0x5b, 0x8, 0x1, 0x8, 0x1, {0x8, 0x5, 0xffffffffffff8001, 0x80}, 0x4, &(0x7f0000000100)=[0x3, 0x6, 0x8e, 0x2243]}}) ioctl$BLKROSET(r6, 0x125d, &(0x7f0000000540)=0x7) connect$rds(r6, &(0x7f0000000040)={0x2, 0x0, @initdev={0xa}}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) write$FUSE_LK(r6, &(0x7f00000000c0)={0x28, 0xfffffffffffffffe, 0x4, {{0x6, 0x7, 0x1, r7}}}, 0x28) [ 2743.214604][ T26] audit: type=1800 audit(1553170375.493:1522): pid=9066 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16569 res=0 12:12:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) 12:12:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2743.312779][ T9117] sctp: [Deprecated]: syz-executor.0 (pid 9117) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2743.312779][ T9117] Use struct sctp_sack_info instead 12:12:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0xf47) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000080)={[{0x100000001, 0xffffffff, 0x0, 0x6, 0xfff, 0xd607, 0x6, 0xe5a, 0x80000000, 0x101, 0xf56, 0xfff}, {0x7, 0x40, 0xe2b, 0x1f, 0x1ff, 0x401, 0x9, 0x1, 0xffff, 0x3, 0x8, 0x4, 0x100000000}, {0x476, 0x0, 0x100000001, 0x4, 0x4, 0x7, 0x6, 0xfff, 0x75c7, 0x1000, 0xfffffffffffffff7, 0x51, 0xfffffffffffffffc}], 0x80}) pwrite64(r0, &(0x7f0000000700)="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", 0x1000, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x30000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) 12:12:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:12:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x53b) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) 12:12:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x2000) r0 = socket$inet(0x2, 0x100000000a05, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) accept4$alg(r1, 0x0, 0x0, 0x80800) 12:12:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:12:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 0: socket$caif_stream(0x25, 0x1, 0x2) r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/autofs\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000004ec0), 0x4) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:12:57 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:12:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x82000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x1, 0x4) r1 = socket$inet(0x2, 0x100000000805, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xf7, 0x40080) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x4e23, @initdev={0xa}}, 0x10) listen(r1, 0x0) 12:12:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:12:57 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 0: socket$inet(0x2, 0x100000000805, 0xffffffffffffffbd) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x600041, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:12:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x183, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x314c, 0x2, 0x2, 0x0, 0x1}, 0x8) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@multicast2, @local, @loopback}, 0xc) r1 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:12:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:58 executing program 0: r0 = socket$inet(0x2, 0x200100000000804, 0x8001) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000040)={0x1, 0x0, [{}]}) 12:12:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:12:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:12:58 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x139100, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000040)={0x800, 0x200}) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:12:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:12:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:12:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:59 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4, 0x223) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) 12:12:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:12:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:12:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:12:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:12:59 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000080)={0x2, 0x6, 0x7ff, 0x8ef3}, 0x10) connect$rds(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 12:12:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:12:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) [ 2747.240978][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 2747.240992][ T26] audit: type=1800 audit(1553170379.513:1531): pid=10698 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17953 res=0 12:12:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:12:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:12:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2747.418041][ T26] audit: type=1804 audit(1553170379.563:1532): pid=10662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5205/file0/file0" dev="sda1" ino=17953 res=1 12:12:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:12:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:12:59 executing program 0: r0 = socket$inet(0x2, 0x80002, 0x4000000000) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) socket$inet(0x2, 0x1, 0x9c82) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x1, @loopback}, @in6={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x16}, 0x7fff}, @in={0x2, 0x4e20, @rand_addr=0x5}], 0x68) [ 2747.588143][ T26] audit: type=1800 audit(1553170379.563:1533): pid=10662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17953 res=0 12:12:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:12:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) [ 2747.638390][ T26] audit: type=1800 audit(1553170379.893:1534): pid=10924 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17002 res=0 [ 2747.674017][ T26] audit: type=1804 audit(1553170379.893:1535): pid=10924 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5206/file0" dev="sda1" ino=17002 res=1 [ 2747.718890][ T26] audit: type=1800 audit(1553170379.893:1536): pid=10924 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17002 res=0 12:13:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:13:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:00 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) fcntl$setstatus(r0, 0x4, 0x40000) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1ff, 0x22493f30e4ce5834) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x4e) 12:13:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:13:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2748.092879][ T26] audit: type=1800 audit(1553170380.363:1537): pid=11054 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17033 res=0 12:13:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:00 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffff8000, 0x4000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x212, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40050}, 0x4008000) 12:13:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:13:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2748.591073][ T26] audit: type=1800 audit(1553170380.873:1538): pid=11306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=288 res=0 12:13:01 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x44000, 0x40) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x90, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x400, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x400}, @in6={0xa, 0x4e23, 0x91f7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, 0x7fffffff}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e20, 0x2d5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x24}, 0x401}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x1}, 0x8) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000240)={0x2}) r2 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r2, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) getsockopt$inet_int(r2, 0x0, 0x17, &(0x7f00000000c0), &(0x7f0000000080)=0x3b1) 12:13:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2748.739015][ T26] audit: type=1804 audit(1553170380.873:1539): pid=11306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5208/file0/file0" dev="loop5" ino=288 res=1 12:13:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:13:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2748.814364][ T26] audit: type=1800 audit(1553170380.873:1540): pid=11306 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=288 res=0 12:13:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:13:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:01 executing program 0: r0 = socket$inet(0x2, 0x100000000801, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000080)={r1, 0x80000001}, 0x8) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x24d, 0x22002) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000100)) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:13:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:13:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:01 executing program 0: r0 = socket$inet(0x2, 0x7, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x40, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000180)={@loopback, @remote}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0x25, 0x2d, &(0x7f0000000040)="0259f46eec62257c5cc101aa406abace035729b86bdce87face35b4f4dab5e45fbcc6dad9a", &(0x7f0000000080)=""/45, 0x1}, 0x28) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x52, "d8cc0932bb6c0ccd10f25c0881030e161997b3bc5b8351eb761db1964d7bd2978cbcba833843266cf7a096baf78f2914e707f983ca15d54a620582605af9c5f1c6ee555d21e4b84b7ef205f1cce487f60c80"}, &(0x7f0000000240)=0x5a) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r3, @in={{0x2, 0x4e22, @broadcast}}, 0x8, 0xffff, 0x100, 0xf420, 0x200}, &(0x7f0000000340)=0x98) 12:13:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:13:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:13:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4c0, 0x0) flistxattr(r0, &(0x7f0000000080)=""/36, 0x24) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:13:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:13:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:02 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x101, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0xe2fa, @empty, 0xd6e}}, 0x7fff, 0x9}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e20, 0x4, @loopback, 0x1}}, 0x8, 0x100000001, 0xffffffff, 0x40, 0xb}, &(0x7f0000000240)=0x98) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000040)=0xfffffffffffffbff) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) 12:13:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:02 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x400001) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'tunl0\x00', {0x2, 0x4e20, @local}}) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r2, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) fgetxattr(r2, &(0x7f0000000100)=@random={'trusted.', '/dev/media#\x00'}, &(0x7f0000000140)=""/5, 0x5) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0xb2e321d746ee327c, 0x0) open_by_handle_at(r2, &(0x7f0000000180)={0x47, 0xf000000000000000, "9b24b11a17aa346e506720a1e2a3b7681a9e72f798c6a15118503c345313149dfb45541f267a8a3ef5c25b331f929ed0c52be525ec4c513c02f8993829ead4"}, 0x40) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000240)) 12:13:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2750.650250][T12056] Unknown ioctl 22086 [ 2750.670057][T12056] Unknown ioctl 35099 12:13:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2750.720245][T12056] Unknown ioctl 22086 12:13:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:13:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x5}, 0x10) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:13:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x9a, "2aad043fd286b6a877333b1d11b44f50a5e62877f3e320876e2cff2e3798772b88e56b1519ac9da71ded3eba1c6c816a1f0cdaaf88a2c3acf34ab483e5b0d634221f95ec3dd87e89591954f5e6796da7c57655e24776898c05cbf6ec28b37459c2a2b914b62df720e24c170d89e73bbda5124da050e4452abd3f41d95838be79517d989b4ce900e40ec5006162ff1426064654647a626912e92e"}, &(0x7f00000000c0)=0xa2) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r1, 0x1, 0xfffffffffffffffd}, 0xc) r2 = msgget$private(0x0, 0x20) r3 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x8, 0x4000) read$rfkill(r3, &(0x7f00000001c0), 0x8) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000140)=""/28) 12:13:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:03 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000040)) 12:13:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2751.724412][T12455] Unknown ioctl 21532 12:13:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:04 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:04 executing program 0: r0 = socket$inet(0x2, 0x2, 0x1) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @multicast1}, 0x10) 12:13:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:04 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:04 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2000, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48010001}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r2, 0x500, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x100000000}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3ff}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x40000) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x1) connect$rds(r4, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) 12:13:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2752.266065][ T26] kauditd_printk_skb: 33 callbacks suppressed [ 2752.266081][ T26] audit: type=1800 audit(1553170384.543:1574): pid=12608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16690 res=0 12:13:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:04 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2752.453843][ T26] audit: type=1804 audit(1553170384.583:1575): pid=12599 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5219/file0/file0" dev="sda1" ino=16690 res=1 12:13:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:04 executing program 0: r0 = socket$inet(0x2, 0x803, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x1) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x4e21, @empty}, 0x13b) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 12:13:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2752.630507][ T26] audit: type=1800 audit(1553170384.583:1576): pid=12599 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16690 res=0 12:13:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x10000) 12:13:05 executing program 3 (fault-call:6 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2752.734740][ T26] audit: type=1800 audit(1553170384.583:1577): pid=12601 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17050 res=0 [ 2752.766190][ T26] audit: type=1800 audit(1553170384.903:1578): pid=12935 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16881 res=0 [ 2752.790388][ T26] audit: type=1804 audit(1553170384.963:1579): pid=12935 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir125005355/syzkaller.FA6We3/5185/file0" dev="sda1" ino=16881 res=1 12:13:05 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x1b}, &(0x7f00000001c0)=0x8) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e20, 0x5, @mcast2, 0xc8}}, 0x10001, 0x3f, 0x401, 0x8, 0x15}, &(0x7f00000002c0)=0x98) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000340)) r4 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xffd, 0x0) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000400)={0x3, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x209}]}}) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x4) r6 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="d0c6d977de754314362ad6658c46f6504fbe6079c0831561edb3ae3d2f8e7626198ad54b60d3856be6779de879a4301319de6b", 0x33, 0x0) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='&\x00') setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000500)="61efe28c6644071eab5d89e6eb70c09c4c1ab76112929918ad64ec079454a09b27ca463a5004c0f7caabbeaf09a1106b33a5a1952d26c7e5cf03f157c6a13062ca24e6a45c1a7c1f11f30e7c0d248016215aaf8cf475c94aeb31bfc5844f25ae2c0bb72dd08cef986db96e1f645b59484c788bc0015fa4a2db6c6090b5794101388b6ad5c768e3db986152ba22e96228b3afc919acb8eb6f3188162f4d50bfe17f77ce96a79e0191438eff5e0e813781a1b3679374af8cc07f2c75", 0xbb) [ 2752.819045][ T26] audit: type=1800 audit(1553170384.963:1580): pid=12935 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16881 res=0 [ 2752.843479][ T26] audit: type=1800 audit(1553170384.983:1581): pid=12972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17057 res=0 [ 2752.869400][ T26] audit: type=1804 audit(1553170384.983:1582): pid=12972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5220/file0/file0" dev="sda1" ino=17057 res=1 [ 2752.981167][T13110] FAULT_INJECTION: forcing a failure. [ 2752.981167][T13110] name failslab, interval 1, probability 0, space 0, times 0 12:13:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2753.039415][T13110] CPU: 1 PID: 13110 Comm: syz-executor.3 Not tainted 5.1.0-rc1+ #31 [ 2753.047465][T13110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2753.057526][T13110] Call Trace: [ 2753.060832][T13110] dump_stack+0x172/0x1f0 [ 2753.065181][T13110] should_fail.cold+0xa/0x15 [ 2753.069793][T13110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2753.075613][T13110] ? ___might_sleep+0x163/0x280 [ 2753.080319][ T26] audit: type=1800 audit(1553170384.983:1583): pid=12972 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17057 res=0 [ 2753.080471][T13110] __should_failslab+0x121/0x190 [ 2753.080499][T13110] should_failslab+0x9/0x14 [ 2753.113469][T13110] __kmalloc+0x2dc/0x740 [ 2753.117716][T13110] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2753.123961][T13110] ? _kstrtoull+0x14c/0x200 [ 2753.128480][T13110] ? _parse_integer+0x190/0x190 [ 2753.133345][T13110] ? rw_copy_check_uvector+0x28c/0x330 [ 2753.138811][T13110] rw_copy_check_uvector+0x28c/0x330 [ 2753.144123][T13110] import_iovec+0xbf/0x200 [ 2753.148550][T13110] ? dup_iter+0x260/0x260 [ 2753.152878][T13110] ? __fget+0x35a/0x550 [ 2753.157040][T13110] vfs_readv+0xc6/0x160 [ 2753.161178][T13110] ? lock_downgrade+0x880/0x880 [ 2753.166012][T13110] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2753.172060][T13110] ? kasan_check_read+0x11/0x20 [ 2753.176919][T13110] ? __fget+0x381/0x550 [ 2753.181062][T13110] ? ksys_dup3+0x3e0/0x3e0 [ 2753.185462][T13110] ? wait_for_completion+0x440/0x440 [ 2753.190742][T13110] ? __fget_light+0x1a9/0x230 [ 2753.195415][T13110] do_preadv+0x1c4/0x280 [ 2753.199640][T13110] ? do_readv+0x290/0x290 [ 2753.203951][T13110] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2753.209391][T13110] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2753.214849][T13110] ? do_syscall_64+0x26/0x610 [ 2753.219508][T13110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2753.225567][T13110] ? do_syscall_64+0x26/0x610 [ 2753.230234][T13110] __x64_sys_preadv+0x9a/0xf0 [ 2753.234898][T13110] do_syscall_64+0x103/0x610 [ 2753.239500][T13110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2753.245381][T13110] RIP: 0033:0x458079 [ 2753.249256][T13110] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2753.268858][T13110] RSP: 002b:00007ff73b0e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2753.277259][T13110] RAX: ffffffffffffffda RBX: 00007ff73b0e2c90 RCX: 0000000000458079 [ 2753.285215][T13110] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2753.293172][T13110] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2753.301135][T13110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff73b0e36d4 [ 2753.309119][T13110] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:05 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0xffffffffffffffa8) 12:13:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:05 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:05 executing program 3 (fault-call:6 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:05 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x4000, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) readahead(r0, 0x2, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) [ 2753.565854][T13379] FAULT_INJECTION: forcing a failure. [ 2753.565854][T13379] name failslab, interval 1, probability 0, space 0, times 0 [ 2753.589115][T13379] CPU: 0 PID: 13379 Comm: syz-executor.2 Not tainted 5.1.0-rc1+ #31 [ 2753.597132][T13379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2753.597140][T13379] Call Trace: [ 2753.597168][T13379] dump_stack+0x172/0x1f0 [ 2753.597200][T13379] should_fail.cold+0xa/0x15 [ 2753.619476][T13379] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2753.625291][T13379] ? ___might_sleep+0x163/0x280 [ 2753.630161][T13379] __should_failslab+0x121/0x190 [ 2753.635127][T13379] should_failslab+0x9/0x14 [ 2753.639638][T13379] __kmalloc+0x2dc/0x740 [ 2753.643898][T13379] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2753.650143][T13379] ? _kstrtoull+0x14c/0x200 [ 2753.654662][T13379] ? _parse_integer+0x190/0x190 [ 2753.654681][T13379] ? rw_copy_check_uvector+0x28c/0x330 [ 2753.654701][T13379] rw_copy_check_uvector+0x28c/0x330 [ 2753.654726][T13379] import_iovec+0xbf/0x200 [ 2753.670316][T13379] ? dup_iter+0x260/0x260 [ 2753.670334][T13379] ? __fget+0x35a/0x550 [ 2753.670361][T13379] vfs_readv+0xc6/0x160 [ 2753.687437][T13379] ? lock_downgrade+0x880/0x880 [ 2753.692317][T13379] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2753.698395][T13379] ? kasan_check_read+0x11/0x20 [ 2753.703262][T13379] ? __fget+0x381/0x550 [ 2753.707779][T13379] ? ksys_dup3+0x3e0/0x3e0 [ 2753.712211][T13379] ? wait_for_completion+0x440/0x440 [ 2753.717506][T13379] ? __fget_light+0x1a9/0x230 [ 2753.722196][T13379] do_preadv+0x1c4/0x280 [ 2753.726446][T13379] ? do_readv+0x290/0x290 [ 2753.726464][T13379] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2753.726480][T13379] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2753.726495][T13379] ? do_syscall_64+0x26/0x610 [ 2753.726510][T13379] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2753.726524][T13379] ? do_syscall_64+0x26/0x610 [ 2753.726544][T13379] __x64_sys_preadv+0x9a/0xf0 [ 2753.757162][T13379] do_syscall_64+0x103/0x610 [ 2753.757192][T13379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2753.757205][T13379] RIP: 0033:0x458079 [ 2753.757220][T13379] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2753.757228][T13379] RSP: 002b:00007f064c299c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2753.757243][T13379] RAX: ffffffffffffffda RBX: 00007f064c299c90 RCX: 0000000000458079 12:13:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2753.757252][T13379] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2753.757267][T13379] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2753.782533][T13480] FAULT_INJECTION: forcing a failure. [ 2753.782533][T13480] name failslab, interval 1, probability 0, space 0, times 0 [ 2753.795880][T13379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f064c29a6d4 [ 2753.795889][T13379] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:06 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2753.860526][T13480] CPU: 0 PID: 13480 Comm: syz-executor.3 Not tainted 5.1.0-rc1+ #31 [ 2753.868782][T13480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2753.878860][T13480] Call Trace: [ 2753.882160][T13480] dump_stack+0x172/0x1f0 [ 2753.886512][T13480] should_fail.cold+0xa/0x15 [ 2753.891125][T13480] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2753.896950][T13480] ? ___might_sleep+0x163/0x280 [ 2753.901808][T13480] __should_failslab+0x121/0x190 [ 2753.906765][T13480] should_failslab+0x9/0x14 [ 2753.911279][T13480] kmem_cache_alloc_node_trace+0x270/0x720 12:13:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2753.917171][T13480] ? fsnotify+0x811/0xbc0 [ 2753.921526][T13480] __kmalloc_node+0x3d/0x70 [ 2753.926039][T13480] kvmalloc_node+0x68/0x100 [ 2753.930549][T13480] seq_read+0x832/0x1130 [ 2753.934801][T13480] ? rw_verify_area+0x118/0x360 [ 2753.939656][T13480] do_iter_read+0x4a9/0x660 [ 2753.944163][T13480] ? dup_iter+0x260/0x260 [ 2753.948502][T13480] vfs_readv+0xf0/0x160 [ 2753.952639][T13480] ? lock_downgrade+0x880/0x880 [ 2753.957472][T13480] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2753.963565][T13480] ? kasan_check_read+0x11/0x20 [ 2753.968404][T13480] ? ksys_dup3+0x3e0/0x3e0 [ 2753.972934][T13480] ? wait_for_completion+0x440/0x440 [ 2753.978205][T13480] ? __fget_light+0x1a9/0x230 [ 2753.982868][T13480] do_preadv+0x1c4/0x280 [ 2753.987093][T13480] ? do_readv+0x290/0x290 [ 2753.991423][T13480] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2753.996901][T13480] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2754.002342][T13480] ? do_syscall_64+0x26/0x610 [ 2754.006999][T13480] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2754.013054][T13480] ? do_syscall_64+0x26/0x610 [ 2754.017741][T13480] __x64_sys_preadv+0x9a/0xf0 [ 2754.022426][T13480] do_syscall_64+0x103/0x610 [ 2754.027002][T13480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2754.032872][T13480] RIP: 0033:0x458079 [ 2754.036747][T13480] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2754.056333][T13480] RSP: 002b:00007ff73b0e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2754.064724][T13480] RAX: ffffffffffffffda RBX: 00007ff73b0e2c90 RCX: 0000000000458079 [ 2754.072674][T13480] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2754.080629][T13480] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2754.088593][T13480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff73b0e36d4 [ 2754.096574][T13480] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:06 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000040)={0xfb, 0x2}) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) [ 2754.197190][T13694] FAULT_INJECTION: forcing a failure. [ 2754.197190][T13694] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2754.210479][T13694] CPU: 1 PID: 13694 Comm: syz-executor.2 Not tainted 5.1.0-rc1+ #31 [ 2754.218497][T13694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2754.228553][T13694] Call Trace: [ 2754.231859][T13694] dump_stack+0x172/0x1f0 [ 2754.236214][T13694] should_fail.cold+0xa/0x15 [ 2754.240816][T13694] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2754.246630][T13694] ? __lock_acquire+0x548/0x3fb0 [ 2754.251580][T13694] ? is_bpf_text_address+0xac/0x170 [ 2754.256791][T13694] should_fail_alloc_page+0x50/0x60 [ 2754.261997][T13694] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2754.267382][T13694] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2754.273119][T13694] ? find_held_lock+0x35/0x130 [ 2754.277901][T13694] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2754.283725][T13694] cache_grow_begin+0x9c/0x860 [ 2754.288504][T13694] ? rw_copy_check_uvector+0x28c/0x330 [ 2754.293974][T13694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2754.300487][T13694] __kmalloc+0x67f/0x740 [ 2754.304736][T13694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2754.310980][T13694] ? _kstrtoull+0x14c/0x200 [ 2754.315496][T13694] ? rw_copy_check_uvector+0x28c/0x330 [ 2754.320973][T13694] rw_copy_check_uvector+0x28c/0x330 [ 2754.326273][T13694] import_iovec+0xbf/0x200 [ 2754.330706][T13694] ? dup_iter+0x260/0x260 [ 2754.335047][T13694] ? __fget+0x35a/0x550 [ 2754.339708][T13694] vfs_readv+0xc6/0x160 [ 2754.343885][T13694] ? lock_downgrade+0x880/0x880 [ 2754.348745][T13694] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2754.354820][T13694] ? kasan_check_read+0x11/0x20 [ 2754.359703][T13694] ? __fget+0x381/0x550 [ 2754.363873][T13694] ? ksys_dup3+0x3e0/0x3e0 [ 2754.368301][T13694] ? wait_for_completion+0x440/0x440 [ 2754.373600][T13694] ? __fget_light+0x1a9/0x230 [ 2754.378301][T13694] do_preadv+0x1c4/0x280 [ 2754.382556][T13694] ? do_readv+0x290/0x290 [ 2754.386954][T13694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2754.392593][T13694] ? trace_hardirqs_on_thunk+0x1a/0x1c 12:13:06 executing program 3 (fault-call:6 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:06 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f00000000c0)) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x100}, 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4001, 0x0) 12:13:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2754.398061][T13694] ? do_syscall_64+0x26/0x610 [ 2754.402753][T13694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2754.408827][T13694] ? do_syscall_64+0x26/0x610 [ 2754.413523][T13694] __x64_sys_preadv+0x9a/0xf0 [ 2754.418212][T13694] do_syscall_64+0x103/0x610 [ 2754.422817][T13694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2754.428713][T13694] RIP: 0033:0x458079 12:13:06 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000000c0)={0x3, 0x9, 0x4}) r1 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2100, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000040)={0x1, 0x6, 0x5}) [ 2754.432616][T13694] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2754.452233][T13694] RSP: 002b:00007f064c299c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2754.460873][T13694] RAX: ffffffffffffffda RBX: 00007f064c299c90 RCX: 0000000000458079 [ 2754.468849][T13694] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2754.476820][T13694] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2754.484826][T13694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f064c29a6d4 [ 2754.492803][T13694] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:06 executing program 4 (fault-call:6 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:06 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2754.626456][T14162] FAULT_INJECTION: forcing a failure. [ 2754.626456][T14162] name failslab, interval 1, probability 0, space 0, times 0 [ 2754.648756][T14172] FAULT_INJECTION: forcing a failure. [ 2754.648756][T14172] name failslab, interval 1, probability 0, space 0, times 0 [ 2754.685695][T14162] CPU: 1 PID: 14162 Comm: syz-executor.3 Not tainted 5.1.0-rc1+ #31 [ 2754.693707][T14162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2754.703770][T14162] Call Trace: [ 2754.707072][T14162] dump_stack+0x172/0x1f0 [ 2754.711444][T14162] should_fail.cold+0xa/0x15 [ 2754.711469][T14162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2754.711493][T14162] ? ___might_sleep+0x163/0x280 [ 2754.721873][T14162] __should_failslab+0x121/0x190 [ 2754.731640][T14162] should_failslab+0x9/0x14 [ 2754.736160][T14162] kmem_cache_alloc_node_trace+0x270/0x720 [ 2754.741977][T14162] ? fsnotify+0x811/0xbc0 [ 2754.746324][T14162] __kmalloc_node+0x3d/0x70 [ 2754.750847][T14162] kvmalloc_node+0x68/0x100 [ 2754.755364][T14162] seq_read+0x832/0x1130 [ 2754.759629][T14162] ? rw_verify_area+0x118/0x360 [ 2754.764483][T14162] do_iter_read+0x4a9/0x660 [ 2754.768984][T14162] ? dup_iter+0x260/0x260 [ 2754.773343][T14162] vfs_readv+0xf0/0x160 [ 2754.777494][T14162] ? lock_downgrade+0x880/0x880 [ 2754.782347][T14162] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2754.788410][T14162] ? kasan_check_read+0x11/0x20 [ 2754.793274][T14162] ? ksys_dup3+0x3e0/0x3e0 [ 2754.797777][T14162] ? wait_for_completion+0x440/0x440 [ 2754.803065][T14162] ? __fget_light+0x1a9/0x230 [ 2754.807749][T14162] do_preadv+0x1c4/0x280 [ 2754.811991][T14162] ? do_readv+0x290/0x290 [ 2754.816319][T14162] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2754.821774][T14162] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2754.827234][T14162] ? do_syscall_64+0x26/0x610 [ 2754.831910][T14162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2754.837992][T14162] ? do_syscall_64+0x26/0x610 [ 2754.842681][T14162] __x64_sys_preadv+0x9a/0xf0 [ 2754.847358][T14162] do_syscall_64+0x103/0x610 [ 2754.851961][T14162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2754.857845][T14162] RIP: 0033:0x458079 [ 2754.861735][T14162] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2754.881338][T14162] RSP: 002b:00007ff73b0e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2754.889747][T14162] RAX: ffffffffffffffda RBX: 00007ff73b0e2c90 RCX: 0000000000458079 [ 2754.897728][T14162] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2754.905710][T14162] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2754.913701][T14162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff73b0e36d4 [ 2754.921671][T14162] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:07 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f0000000000)={0x2, 0xfffffffffffffffb, @initdev={0xa}}, 0xfffffffffffffe24) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3f, 0x20000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x3f, 0x0, 0x1, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000000c0)={0x1, r2}) [ 2754.932008][T14172] CPU: 0 PID: 14172 Comm: syz-executor.4 Not tainted 5.1.0-rc1+ #31 [ 2754.940007][T14172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2754.950056][T14172] Call Trace: [ 2754.953355][T14172] dump_stack+0x172/0x1f0 [ 2754.957697][T14172] should_fail.cold+0xa/0x15 [ 2754.962384][T14172] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2754.968210][T14172] ? ___might_sleep+0x163/0x280 [ 2754.973161][T14172] __should_failslab+0x121/0x190 [ 2754.978134][T14172] should_failslab+0x9/0x14 [ 2754.982653][T14172] __kmalloc+0x2dc/0x740 [ 2754.986900][T14172] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2754.993147][T14172] ? _kstrtoull+0x14c/0x200 [ 2754.997656][T14172] ? _parse_integer+0x190/0x190 [ 2755.002517][T14172] ? rw_copy_check_uvector+0x28c/0x330 [ 2755.007982][T14172] rw_copy_check_uvector+0x28c/0x330 [ 2755.013284][T14172] import_iovec+0xbf/0x200 [ 2755.017705][T14172] ? dup_iter+0x260/0x260 [ 2755.022063][T14172] ? __fget+0x35a/0x550 [ 2755.026265][T14172] vfs_readv+0xc6/0x160 [ 2755.030456][T14172] ? lock_downgrade+0x880/0x880 12:13:07 executing program 3 (fault-call:6 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:07 executing program 0: r0 = socket$inet(0x2, 0x100000000809, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="9f", 0x1}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f00000000c0)="fb36957e5af24dd50c981e6d1e44602398a490dd0f4c709e5ee1d305f86d8b68c1dd25a174e4a2d2774690a9138347cdcb7858be4ac01211184f43da863edcff9afec36771cd5d4c240922394a315df54da6a1b4e8ab3b629a46b4a97f5385a9fcfe5ad03489cc7e30a53f249f8c85edde93862733f0115403c5f9954d31cc7d9cafa012a71bde0dc58b6305eb8c7365ff3d5db499f016c0752a77b3639b3f4afa015553626ea849988a31dd42a5f367277da9a8a369472e2ae17f8d", 0xbc}], 0x3, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000040)=0x5) [ 2755.035317][T14172] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2755.041393][T14172] ? kasan_check_read+0x11/0x20 [ 2755.046250][T14172] ? __fget+0x381/0x550 [ 2755.050413][T14172] ? ksys_dup3+0x3e0/0x3e0 [ 2755.054837][T14172] ? wait_for_completion+0x440/0x440 [ 2755.060225][T14172] ? __fget_light+0x1a9/0x230 [ 2755.064909][T14172] do_preadv+0x1c4/0x280 [ 2755.069158][T14172] ? do_readv+0x290/0x290 [ 2755.073501][T14172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2755.078968][T14172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2755.084433][T14172] ? do_syscall_64+0x26/0x610 [ 2755.089126][T14172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2755.095207][T14172] ? do_syscall_64+0x26/0x610 [ 2755.099897][T14172] __x64_sys_preadv+0x9a/0xf0 [ 2755.104581][T14172] do_syscall_64+0x103/0x610 [ 2755.109185][T14172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2755.115081][T14172] RIP: 0033:0x458079 12:13:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) [ 2755.118987][T14172] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2755.138590][T14172] RSP: 002b:00007f7d38b71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2755.147005][T14172] RAX: ffffffffffffffda RBX: 00007f7d38b71c90 RCX: 0000000000458079 [ 2755.155149][T14172] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2755.163131][T14172] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2755.171122][T14172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d38b726d4 [ 2755.179107][T14172] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 [ 2755.254428][T14468] FAT-fs (loop5): bogus number of reserved sectors [ 2755.286371][T14476] FAULT_INJECTION: forcing a failure. [ 2755.286371][T14476] name failslab, interval 1, probability 0, space 0, times 0 [ 2755.299788][T14476] CPU: 1 PID: 14476 Comm: syz-executor.3 Not tainted 5.1.0-rc1+ #31 [ 2755.307781][T14476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2755.317932][T14476] Call Trace: [ 2755.324366][T14476] dump_stack+0x172/0x1f0 [ 2755.328717][T14476] should_fail.cold+0xa/0x15 [ 2755.333319][T14476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2755.339164][T14476] ? __lock_acquire+0x548/0x3fb0 [ 2755.344123][T14476] __should_failslab+0x121/0x190 [ 2755.344144][T14476] should_failslab+0x9/0x14 [ 2755.344164][T14476] __kmalloc+0x71/0x740 [ 2755.357841][T14476] ? context_struct_to_string+0x368/0x950 [ 2755.363573][T14476] context_struct_to_string+0x368/0x950 [ 2755.369139][T14476] ? dump_masked_av_helper+0xa0/0xa0 [ 2755.374705][T14476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2755.379299][T14468] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2755.380990][T14476] ? sidtab_search_core+0x164/0x210 [ 2755.381014][T14476] security_sid_to_context_core.isra.0+0x2fb/0x390 12:13:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2b}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:07 executing program 4 (fault-call:6 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:07 executing program 0: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000001, r0) r1 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r1, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80800) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f00000000c0)=""/144) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={r1}) [ 2755.381034][T14476] security_sid_to_context+0x37/0x50 [ 2755.381058][T14476] show_sid+0x9b/0x190 [ 2755.414965][T14476] ? selinux_add_mnt_opt+0x200/0x200 [ 2755.420401][T14476] ? seq_puts+0xc0/0x130 [ 2755.424877][T14476] selinux_sb_show_options+0x485/0x550 [ 2755.430474][T14476] security_sb_show_options+0x71/0xb0 [ 2755.435861][T14476] show_sb_opts+0xcf/0x100 [ 2755.440298][T14476] show_mountinfo+0x593/0x940 [ 2755.445027][T14476] ? show_vfsmnt+0x420/0x420 [ 2755.449640][T14476] ? down_read+0x3b/0x90 [ 2755.454511][T14476] ? m_start+0x51/0x330 [ 2755.458712][T14476] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2755.464480][T14476] m_show+0x66/0x80 [ 2755.468305][T14476] seq_read+0xad3/0x1130 [ 2755.473518][T14476] do_iter_read+0x4a9/0x660 [ 2755.478034][T14476] ? dup_iter+0x260/0x260 [ 2755.482388][T14476] vfs_readv+0xf0/0x160 [ 2755.486671][T14476] ? lock_downgrade+0x880/0x880 [ 2755.491544][T14476] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2755.497802][T14476] ? kasan_check_read+0x11/0x20 [ 2755.502687][T14476] ? ksys_dup3+0x3e0/0x3e0 [ 2755.508262][T14476] ? wait_for_completion+0x440/0x440 [ 2755.513829][T14476] ? __fget_light+0x1a9/0x230 [ 2755.518587][T14476] do_preadv+0x1c4/0x280 [ 2755.522868][T14476] ? do_readv+0x290/0x290 [ 2755.527210][T14476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2755.532683][T14476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2755.538155][T14476] ? do_syscall_64+0x26/0x610 [ 2755.542838][T14476] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2755.548917][T14476] ? do_syscall_64+0x26/0x610 12:13:07 executing program 0: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x405, r1) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000000)) r4 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='\x00', 0xfffffffffffffffd) add_key(&(0x7f0000000340)='\xecpgo\x9c\x00D\x93\f\xf8(\a\xb7\x95\xdf\x85\xfc 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2755.592490][T14476] RSP: 002b:00007ff73b0e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 12:13:07 executing program 0: socket$inet(0x2, 0x2, 0x3) r0 = socket$inet(0x2, 0x80001, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x9, 0x0, 0xffffffffffffffe0, 0x4, 0xe4c7, 0x7ff, 0xa8}) iopl(0x4215) r2 = semget(0x1, 0x7, 0x0) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000080)=0x7ff) 12:13:07 executing program 3 (fault-call:6 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2755.600914][T14476] RAX: ffffffffffffffda RBX: 00007ff73b0e2c90 RCX: 0000000000458079 [ 2755.608890][T14476] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2755.616862][T14476] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2755.624836][T14476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff73b0e36d4 [ 2755.632820][T14476] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:13:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2755.791306][T14978] FAULT_INJECTION: forcing a failure. [ 2755.791306][T14978] name failslab, interval 1, probability 0, space 0, times 0 [ 2755.804029][T14978] CPU: 0 PID: 14978 Comm: syz-executor.3 Not tainted 5.1.0-rc1+ #31 [ 2755.812016][T14978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2755.822075][T14978] Call Trace: [ 2755.825393][T14978] dump_stack+0x172/0x1f0 [ 2755.829745][T14978] should_fail.cold+0xa/0x15 [ 2755.834356][T14978] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2755.840181][T14978] ? __lock_acquire+0x548/0x3fb0 [ 2755.845140][T14978] __should_failslab+0x121/0x190 [ 2755.850189][T14978] should_failslab+0x9/0x14 [ 2755.854702][T14978] __kmalloc+0x71/0x740 [ 2755.858870][T14978] ? context_struct_to_string+0x368/0x950 [ 2755.864711][T14978] context_struct_to_string+0x368/0x950 [ 2755.870300][T14978] ? dump_masked_av_helper+0xa0/0xa0 [ 2755.875596][T14978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2755.881840][T14978] ? sidtab_search_core+0x164/0x210 12:13:08 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x40000) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f0000000040)={0x3, "25fa965d2d1d5e160c44d078cddb32d0fa4703d5723731d086f04c66489134dc", 0x20, 0x7dd1f934, 0x200, 0x14, 0x3}) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) [ 2755.887048][T14978] security_sid_to_context_core.isra.0+0x2fb/0x390 [ 2755.893682][T14978] security_sid_to_context+0x37/0x50 [ 2755.898980][T14978] show_sid+0x9b/0x190 [ 2755.903064][T14978] ? selinux_add_mnt_opt+0x200/0x200 [ 2755.908371][T14978] ? seq_puts+0xc0/0x130 [ 2755.912627][T14978] selinux_sb_show_options+0x485/0x550 [ 2755.918109][T14978] security_sb_show_options+0x71/0xb0 [ 2755.923496][T14978] show_sb_opts+0xcf/0x100 [ 2755.927953][T14978] show_mountinfo+0x593/0x940 [ 2755.932664][T14978] ? show_vfsmnt+0x420/0x420 [ 2755.937269][T14978] ? down_read+0x3b/0x90 [ 2755.941515][T14978] ? m_start+0x51/0x330 [ 2755.945678][T14978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2755.951411][T14978] m_show+0x66/0x80 [ 2755.955231][T14978] seq_read+0x4db/0x1130 [ 2755.959495][T14978] do_iter_read+0x4a9/0x660 [ 2755.964002][T14978] ? dup_iter+0x260/0x260 [ 2755.968349][T14978] vfs_readv+0xf0/0x160 [ 2755.972602][T14978] ? lock_downgrade+0x880/0x880 [ 2755.977620][T14978] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2755.983706][T14978] ? kasan_check_read+0x11/0x20 [ 2755.988581][T14978] ? ksys_dup3+0x3e0/0x3e0 [ 2755.993009][T14978] ? wait_for_completion+0x440/0x440 [ 2755.998306][T14978] ? __fget_light+0x1a9/0x230 [ 2756.002998][T14978] do_preadv+0x1c4/0x280 [ 2756.007251][T14978] ? do_readv+0x290/0x290 [ 2756.011588][T14978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2756.017064][T14978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2756.022547][T14978] ? do_syscall_64+0x26/0x610 [ 2756.027231][T14978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2756.033331][T14978] ? do_syscall_64+0x26/0x610 12:13:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) [ 2756.038021][T14978] __x64_sys_preadv+0x9a/0xf0 [ 2756.043155][T14978] do_syscall_64+0x103/0x610 [ 2756.047769][T14978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2756.053675][T14978] RIP: 0033:0x458079 [ 2756.057574][T14978] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2756.077191][T14978] RSP: 002b:00007ff73b0e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 12:13:08 executing program 0: r0 = socket$inet(0x2, 0x80008, 0x80000000) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x0) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000040)="e145ffe87aa0feb8fac5fb", 0xb) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:13:08 executing program 3 (fault-call:6 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2756.085613][T14978] RAX: ffffffffffffffda RBX: 00007ff73b0e2c90 RCX: 0000000000458079 [ 2756.093589][T14978] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2756.101565][T14978] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2756.109555][T14978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff73b0e36d4 [ 2756.117537][T14978] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x34}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2756.181617][T15439] FAT-fs (loop5): bogus number of reserved sectors [ 2756.188470][T15439] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:08 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e22, @multicast2}, {0x306, @dev={[], 0x2b}}, 0x2, {0x2, 0x4e20, @multicast2}, 'ip6erspan0\x00'}) 12:13:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x3d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2756.295309][T15573] FAULT_INJECTION: forcing a failure. [ 2756.295309][T15573] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.409586][T15573] CPU: 1 PID: 15573 Comm: syz-executor.3 Not tainted 5.1.0-rc1+ #31 [ 2756.417611][T15573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2756.427684][T15573] Call Trace: [ 2756.430992][T15573] dump_stack+0x172/0x1f0 [ 2756.435339][T15573] should_fail.cold+0xa/0x15 [ 2756.439953][T15573] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2756.445778][T15573] ? ___might_sleep+0x163/0x280 [ 2756.450645][T15573] __should_failslab+0x121/0x190 [ 2756.455605][T15573] should_failslab+0x9/0x14 [ 2756.460134][T15573] kmem_cache_alloc_trace+0x2d1/0x760 [ 2756.465516][T15573] ? seq_printf+0xbb/0xf0 [ 2756.470427][T15573] cgroup_show_path+0xca/0x590 [ 2756.475205][T15573] ? cpu_stat_show+0x940/0x940 [ 2756.480028][T15573] kernfs_sop_show_path+0x133/0x1b0 [ 2756.485242][T15573] ? kernfs_test_super+0x140/0x140 [ 2756.490367][T15573] show_mountinfo+0x248/0x940 [ 2756.495053][T15573] ? show_vfsmnt+0x420/0x420 [ 2756.499658][T15573] ? down_read+0x3b/0x90 [ 2756.503914][T15573] ? m_start+0x51/0x330 [ 2756.508076][T15573] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2756.513817][T15573] m_show+0x66/0x80 [ 2756.517633][T15573] seq_read+0xad3/0x1130 [ 2756.521901][T15573] do_iter_read+0x4a9/0x660 [ 2756.526411][T15573] ? dup_iter+0x260/0x260 [ 2756.530758][T15573] vfs_readv+0xf0/0x160 [ 2756.534921][T15573] ? lock_downgrade+0x880/0x880 [ 2756.539783][T15573] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2756.545855][T15573] ? kasan_check_read+0x11/0x20 [ 2756.550731][T15573] ? ksys_dup3+0x3e0/0x3e0 [ 2756.555159][T15573] ? wait_for_completion+0x440/0x440 [ 2756.560457][T15573] ? __fget_light+0x1a9/0x230 [ 2756.565155][T15573] do_preadv+0x1c4/0x280 [ 2756.569427][T15573] ? do_readv+0x290/0x290 [ 2756.573791][T15573] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2756.579260][T15573] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2756.584759][T15573] ? do_syscall_64+0x26/0x610 [ 2756.589449][T15573] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2756.595524][T15573] ? do_syscall_64+0x26/0x610 [ 2756.600214][T15573] __x64_sys_preadv+0x9a/0xf0 [ 2756.604899][T15573] do_syscall_64+0x103/0x610 [ 2756.609497][T15573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2756.615401][T15573] RIP: 0033:0x458079 [ 2756.619300][T15573] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2756.638911][T15573] RSP: 002b:00007ff73b0e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2756.647328][T15573] RAX: ffffffffffffffda RBX: 00007ff73b0e2c90 RCX: 0000000000458079 12:13:08 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) connect$rds(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xa}}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x1eb60) 12:13:08 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x200) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x109900, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x3) bind$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x4e21, 0x4, @rand_addr="b4bb4ce82127a5bf29e65d8763579d5f"}}, 0x3f5) 12:13:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) [ 2756.655307][T15573] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2756.663287][T15573] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2756.671266][T15573] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff73b0e36d4 [ 2756.679246][T15573] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:09 executing program 3 (fault-call:6 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x66}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 0: r0 = socket$inet(0x2, 0x5, 0xfffffffffffffffc) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=""/30, 0x1e, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f0000000240)=""/133, 0x85, r3}}, 0x10) r4 = inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x50000a23) inotify_rm_watch(r1, r4) 12:13:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2756.852706][T16139] FAT-fs (loop5): bogus number of reserved sectors [ 2756.891742][T16139] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2b}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0xc7}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:13:09 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x80000000, 0x8000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000180)={{0x3, 0x6, 0x1, 0x8, 'syz0\x00', 0x20}, 0x0, [0x0, 0x2, 0xffffffff, 0x1, 0x5, 0x0, 0x0, 0x10001, 0x9, 0x1ff, 0x400000, 0x873, 0x3, 0x8001, 0x5, 0x1, 0x10001, 0x6, 0xa90, 0x8, 0x9, 0x9, 0x1, 0x2, 0x6, 0x1, 0x5, 0x800, 0x100, 0x90, 0x64d, 0x0, 0x5, 0x40, 0x400, 0x7, 0x3, 0x3ff, 0x0, 0x2, 0x2, 0x8, 0x9, 0x6, 0x8, 0x10000, 0x0, 0x5, 0x1000, 0x1, 0x3, 0xf3a9, 0x2, 0x40, 0x9f, 0x1f, 0x80000000, 0x0, 0xac9, 0x8, 0x3f, 0x6, 0x7, 0x6, 0x20, 0x3, 0x3, 0x8, 0x7, 0x4, 0x38ef, 0x4, 0x2, 0x5, 0x3, 0x5, 0x5, 0x4000000000000000, 0x20, 0x9, 0x101, 0x3, 0x3, 0x1000, 0x0, 0xfffffffffffffeff, 0x80000000, 0xfffffffffffffffc, 0x3, 0x81, 0x6, 0x9, 0x9, 0x100, 0x9, 0xffffffff, 0x1, 0xff, 0x1, 0x8, 0x9, 0x7, 0x1ff, 0x7f, 0x4, 0x101, 0x7, 0x2, 0x7, 0x3ff, 0x0, 0x80000001, 0x8, 0x68, 0x6, 0x101, 0x5, 0x5, 0x0, 0x34b, 0x7, 0xaef1, 0x8, 0x7, 0x1, 0x0, 0x1, 0xc000000000000000], {0x77359400}}) init_module(&(0x7f0000000680)='y\x00', 0x2, &(0x7f00000006c0)=':[\x00') r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0x4, 0x384f16a4, 0x2, 0xffffffff80000001, 0x18, 0x1ff}) connect$rds(r1, &(0x7f00000000c0)={0x2, 0x200, @remote}, 0x10) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) 12:13:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2000006a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:09 executing program 1 (fault-call:6 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x7ffff000}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2757.322590][T16585] FAT-fs (loop5): bogus number of reserved sectors 12:13:09 executing program 0: r0 = socket$inet(0x2, 0x100000000806, 0xc2) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000000)="7bd45b927d84e25a3ab7d7d9bcc25ac5c98c0b33e77f55230cbd453da170041020d71bee15e28afd8b1303d14c72c90ff95244", 0x33, 0x24000000, 0x0, 0x0) [ 2757.388694][T16585] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2757.404461][T16648] FAULT_INJECTION: forcing a failure. [ 2757.404461][T16648] name failslab, interval 1, probability 0, space 0, times 0 [ 2757.455031][T16648] CPU: 0 PID: 16648 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2757.463069][T16648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2757.463077][T16648] Call Trace: [ 2757.463113][T16648] dump_stack+0x172/0x1f0 [ 2757.463139][T16648] should_fail.cold+0xa/0x15 [ 2757.463160][T16648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2757.463190][T16648] ? ___might_sleep+0x163/0x280 [ 2757.463212][T16648] __should_failslab+0x121/0x190 [ 2757.463232][T16648] should_failslab+0x9/0x14 [ 2757.463249][T16648] __kmalloc+0x2dc/0x740 [ 2757.463265][T16648] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2757.463278][T16648] ? _kstrtoull+0x14c/0x200 [ 2757.463295][T16648] ? _parse_integer+0x190/0x190 [ 2757.463321][T16648] ? rw_copy_check_uvector+0x28c/0x330 [ 2757.510729][T16648] rw_copy_check_uvector+0x28c/0x330 [ 2757.510757][T16648] import_iovec+0xbf/0x200 [ 2757.510773][T16648] ? dup_iter+0x260/0x260 [ 2757.510789][T16648] ? __fget+0x35a/0x550 [ 2757.510809][T16648] vfs_readv+0xc6/0x160 [ 2757.510825][T16648] ? lock_downgrade+0x880/0x880 [ 2757.510842][T16648] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2757.510860][T16648] ? kasan_check_read+0x11/0x20 [ 2757.510877][T16648] ? __fget+0x381/0x550 [ 2757.510897][T16648] ? ksys_dup3+0x3e0/0x3e0 [ 2757.510917][T16648] ? wait_for_completion+0x440/0x440 [ 2757.510937][T16648] ? __fget_light+0x1a9/0x230 [ 2757.510958][T16648] do_preadv+0x1c4/0x280 [ 2757.593320][T16648] ? do_readv+0x290/0x290 [ 2757.597683][T16648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2757.603159][T16648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2757.608630][T16648] ? do_syscall_64+0x26/0x610 [ 2757.613359][T16648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2757.619455][T16648] ? do_syscall_64+0x26/0x610 [ 2757.624252][T16648] __x64_sys_preadv+0x9a/0xf0 [ 2757.628953][T16648] do_syscall_64+0x103/0x610 [ 2757.633954][T16648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2757.640564][T16648] RIP: 0033:0x458079 [ 2757.644492][T16648] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2757.664461][T16648] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2757.673221][T16648] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2757.681213][T16648] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2757.689203][T16648] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2757.697191][T16648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 12:13:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x9}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x34}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2757.705175][T16648] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:10 executing program 1 (fault-call:6 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0xa}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2b}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2757.975869][T17031] FAULT_INJECTION: forcing a failure. [ 2757.975869][T17031] name failslab, interval 1, probability 0, space 0, times 0 12:13:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x3d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.054442][T17031] CPU: 1 PID: 17031 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2758.062477][T17031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2758.072545][T17031] Call Trace: [ 2758.075859][T17031] dump_stack+0x172/0x1f0 [ 2758.080214][T17031] should_fail.cold+0xa/0x15 [ 2758.084826][T17031] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2758.090647][T17031] ? ___might_sleep+0x163/0x280 [ 2758.095521][T17031] __should_failslab+0x121/0x190 [ 2758.100462][T17031] should_failslab+0x9/0x14 [ 2758.104982][T17031] kmem_cache_alloc_node_trace+0x270/0x720 [ 2758.110808][T17031] ? fsnotify+0x811/0xbc0 [ 2758.115179][T17031] __kmalloc_node+0x3d/0x70 [ 2758.119712][T17031] kvmalloc_node+0x68/0x100 [ 2758.124240][T17031] seq_read+0x832/0x1130 [ 2758.128508][T17031] ? rw_verify_area+0x118/0x360 [ 2758.133374][T17031] do_iter_read+0x4a9/0x660 [ 2758.137889][T17031] ? dup_iter+0x260/0x260 [ 2758.142242][T17031] vfs_readv+0xf0/0x160 [ 2758.146405][T17031] ? lock_downgrade+0x880/0x880 12:13:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.151294][T17031] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2758.157370][T17031] ? kasan_check_read+0x11/0x20 [ 2758.162244][T17031] ? ksys_dup3+0x3e0/0x3e0 [ 2758.166676][T17031] ? wait_for_completion+0x440/0x440 [ 2758.171992][T17031] ? __fget_light+0x1a9/0x230 [ 2758.176686][T17031] do_preadv+0x1c4/0x280 [ 2758.180935][T17031] ? do_readv+0x290/0x290 [ 2758.185810][T17031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2758.191255][T17031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2758.196717][T17031] ? do_syscall_64+0x26/0x610 12:13:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.201408][T17031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2758.207496][T17031] ? do_syscall_64+0x26/0x610 [ 2758.212199][T17031] __x64_sys_preadv+0x9a/0xf0 [ 2758.216908][T17031] do_syscall_64+0x103/0x610 [ 2758.221523][T17031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2758.227420][T17031] RIP: 0033:0x458079 [ 2758.231320][T17031] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:13:10 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xffffffff, 0x7, 0x76a, 0x0, 0x3f}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x7fff, 0xffffffffffffffff, 0x1}, &(0x7f0000000100)=0x10) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) [ 2758.251007][T17031] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2758.259410][T17031] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2758.267370][T17031] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2758.275344][T17031] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2758.283319][T17031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2758.291302][T17031] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 [ 2758.318750][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 2758.318765][ T26] audit: type=1800 audit(1553170390.593:1590): pid=17324 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16595 res=0 [ 2758.382654][T17217] FAT-fs (loop5): bogus number of reserved sectors [ 2758.426145][T17217] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:10 executing program 1 (fault-call:6 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.464653][ T26] audit: type=1804 audit(1553170390.633:1591): pid=17324 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5228/file0/file0" dev="sda1" ino=16595 res=1 12:13:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0xc7}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.522750][ T26] audit: type=1800 audit(1553170390.633:1592): pid=17324 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16595 res=0 12:13:10 executing program 0: socket$inet(0x2, 0xb, 0xff) r0 = socket$inet(0x2, 0x100000000805, 0x0) connect$rds(r0, &(0x7f00000006c0)={0x2, 0x0, @initdev={0xa}}, 0x10) 12:13:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x34}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5f5e0ff}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x68}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.777968][T17649] FAT-fs (loop5): bogus number of reserved sectors [ 2758.807845][T17649] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x2000091b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.886114][T17814] FAULT_INJECTION: forcing a failure. [ 2758.886114][T17814] name failslab, interval 1, probability 0, space 0, times 0 [ 2758.899029][T17814] CPU: 1 PID: 17814 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2758.907041][T17814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2758.917135][T17814] Call Trace: [ 2758.920458][T17814] dump_stack+0x172/0x1f0 [ 2758.924853][T17814] should_fail.cold+0xa/0x15 [ 2758.929472][T17814] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:13:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2b}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.935333][T17814] ? __lock_acquire+0x548/0x3fb0 [ 2758.940300][T17814] __should_failslab+0x121/0x190 [ 2758.945275][T17814] should_failslab+0x9/0x14 [ 2758.949844][T17814] __kmalloc+0x71/0x740 [ 2758.954138][T17814] ? context_struct_to_string+0x368/0x950 [ 2758.959935][T17814] context_struct_to_string+0x368/0x950 [ 2758.965514][T17814] ? dump_masked_av_helper+0xa0/0xa0 [ 2758.970842][T17814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2758.977147][T17814] ? sidtab_search_core+0x164/0x210 12:13:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x3d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2758.982391][T17814] security_sid_to_context_core.isra.0+0x2fb/0x390 [ 2758.982412][T17814] security_sid_to_context+0x37/0x50 [ 2758.982429][T17814] show_sid+0x9b/0x190 [ 2758.982444][T17814] ? selinux_add_mnt_opt+0x200/0x200 [ 2758.982463][T17814] ? seq_puts+0xc0/0x130 [ 2758.982487][T17814] selinux_sb_show_options+0x485/0x550 [ 2759.013424][T17814] security_sb_show_options+0x71/0xb0 [ 2759.018834][T17814] show_sb_opts+0xcf/0x100 [ 2759.023355][T17814] show_mountinfo+0x593/0x940 [ 2759.028069][T17814] ? show_vfsmnt+0x420/0x420 [ 2759.032707][T17814] ? down_read+0x3b/0x90 [ 2759.036974][T17814] ? m_start+0x51/0x330 [ 2759.041161][T17814] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2759.047009][T17814] m_show+0x66/0x80 [ 2759.050846][T17814] seq_read+0xad3/0x1130 [ 2759.055144][T17814] do_iter_read+0x4a9/0x660 [ 2759.059989][T17814] ? dup_iter+0x260/0x260 [ 2759.064361][T17814] vfs_readv+0xf0/0x160 [ 2759.068588][T17814] ? lock_downgrade+0x880/0x880 [ 2759.073471][T17814] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2759.079689][T17814] ? kasan_check_read+0x11/0x20 [ 2759.084605][T17814] ? ksys_dup3+0x3e0/0x3e0 [ 2759.089193][T17814] ? wait_for_completion+0x440/0x440 [ 2759.094519][T17814] ? __fget_light+0x1a9/0x230 [ 2759.099230][T17814] do_preadv+0x1c4/0x280 [ 2759.103595][T17814] ? do_readv+0x290/0x290 [ 2759.108162][T17814] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2759.113659][T17814] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2759.119245][T17814] ? do_syscall_64+0x26/0x610 [ 2759.123966][T17814] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2759.130075][T17814] ? do_syscall_64+0x26/0x610 12:13:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) [ 2759.134801][T17814] __x64_sys_preadv+0x9a/0xf0 [ 2759.139521][T17814] do_syscall_64+0x103/0x610 [ 2759.144276][T17814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2759.150316][T17814] RIP: 0033:0x458079 [ 2759.154233][T17814] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2759.173973][T17814] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 12:13:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0xc7}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2759.173990][T17814] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2759.173997][T17814] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2759.174004][T17814] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2759.174011][T17814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2759.174019][T17814] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:11 executing program 1 (fault-call:6 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:11 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) [ 2759.366204][T18094] FAT-fs (loop5): bogus number of reserved sectors [ 2759.385577][ T26] audit: type=1800 audit(1553170391.663:1593): pid=18173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17698 res=0 [ 2759.388932][T18094] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x7fffefd6}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2759.445282][ T26] audit: type=1804 audit(1553170391.663:1594): pid=18173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5230/file0/file0" dev="sda1" ino=17698 res=1 [ 2759.517553][T18250] FAULT_INJECTION: forcing a failure. [ 2759.517553][T18250] name failslab, interval 1, probability 0, space 0, times 0 [ 2759.530351][T18250] CPU: 1 PID: 18250 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2759.538337][T18250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2759.548397][T18250] Call Trace: [ 2759.551719][T18250] dump_stack+0x172/0x1f0 [ 2759.556334][T18250] should_fail.cold+0xa/0x15 [ 2759.561132][T18250] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2759.566959][T18250] ? __lock_acquire+0x548/0x3fb0 [ 2759.571949][T18250] __should_failslab+0x121/0x190 [ 2759.576893][T18250] should_failslab+0x9/0x14 [ 2759.581404][T18250] __kmalloc+0x71/0x740 [ 2759.581426][T18250] ? context_struct_to_string+0x368/0x950 [ 2759.581445][T18250] context_struct_to_string+0x368/0x950 [ 2759.581464][T18250] ? dump_masked_av_helper+0xa0/0xa0 [ 2759.581481][T18250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2759.581497][T18250] ? sidtab_search_core+0x164/0x210 [ 2759.581517][T18250] security_sid_to_context_core.isra.0+0x2fb/0x390 [ 2759.591475][T18250] security_sid_to_context+0x37/0x50 [ 2759.591496][T18250] show_sid+0x9b/0x190 [ 2759.591513][T18250] ? selinux_add_mnt_opt+0x200/0x200 [ 2759.591532][T18250] ? seq_puts+0xc0/0x130 [ 2759.591552][T18250] selinux_sb_show_options+0x485/0x550 [ 2759.591573][T18250] security_sb_show_options+0x71/0xb0 [ 2759.591594][T18250] show_sb_opts+0xcf/0x100 [ 2759.625774][T18250] show_mountinfo+0x593/0x940 [ 2759.635111][T18250] ? show_vfsmnt+0x420/0x420 [ 2759.635133][T18250] ? down_read+0x3b/0x90 [ 2759.635148][T18250] ? m_start+0x51/0x330 [ 2759.635164][T18250] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2759.635194][T18250] m_show+0x66/0x80 [ 2759.674300][ T26] audit: type=1800 audit(1553170391.663:1595): pid=18173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17698 res=0 [ 2759.678579][T18250] seq_read+0xad3/0x1130 [ 2759.678613][T18250] do_iter_read+0x4a9/0x660 [ 2759.678628][T18250] ? dup_iter+0x260/0x260 [ 2759.678652][T18250] vfs_readv+0xf0/0x160 [ 2759.723344][T18250] ? lock_downgrade+0x880/0x880 [ 2759.728229][T18250] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2759.734296][T18250] ? kasan_check_read+0x11/0x20 [ 2759.734325][T18250] ? ksys_dup3+0x3e0/0x3e0 [ 2759.734344][T18250] ? wait_for_completion+0x440/0x440 [ 2759.734364][T18250] ? __fget_light+0x1a9/0x230 [ 2759.734386][T18250] do_preadv+0x1c4/0x280 [ 2759.758096][T18250] ? do_readv+0x290/0x290 [ 2759.762472][T18250] ? trace_hardirqs_on_thunk+0x1a/0x1c 12:13:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:12 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2000006a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x68}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2759.767942][T18250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2759.773413][T18250] ? do_syscall_64+0x26/0x610 [ 2759.778118][T18250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2759.784196][T18250] ? do_syscall_64+0x26/0x610 [ 2759.788938][T18250] __x64_sys_preadv+0x9a/0xf0 [ 2759.793660][T18250] do_syscall_64+0x103/0x610 [ 2759.798289][T18250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2759.804185][T18250] RIP: 0033:0x458079 12:13:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x200008b2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2759.808086][T18250] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2759.827710][T18250] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2759.836132][T18250] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2759.844109][T18250] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2759.844118][T18250] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2759.844126][T18250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2759.844134][T18250] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:12 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x14040) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) r1 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r0, 0x540c) splice(r1, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) [ 2759.932434][T18431] FAT-fs (loop5): bogus number of reserved sectors 12:13:12 executing program 1 (fault-call:6 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2759.966904][ T26] audit: type=1800 audit(1553170392.243:1596): pid=18565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17217 res=0 [ 2759.979629][T18431] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x7fffef7b}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2760.051112][T18602] FAULT_INJECTION: forcing a failure. [ 2760.051112][T18602] name failslab, interval 1, probability 0, space 0, times 0 [ 2760.063965][T18602] CPU: 1 PID: 18602 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2760.071952][T18602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2760.082011][T18602] Call Trace: [ 2760.085318][T18602] dump_stack+0x172/0x1f0 [ 2760.089663][T18602] should_fail.cold+0xa/0x15 [ 2760.094278][T18602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2760.100110][T18602] ? __lock_acquire+0x548/0x3fb0 [ 2760.105063][T18602] __should_failslab+0x121/0x190 [ 2760.110025][T18602] should_failslab+0x9/0x14 [ 2760.114540][T18602] __kmalloc+0x71/0x740 [ 2760.118725][T18602] ? context_struct_to_string+0x368/0x950 [ 2760.124485][T18602] context_struct_to_string+0x368/0x950 [ 2760.130041][T18602] ? dump_masked_av_helper+0xa0/0xa0 [ 2760.135336][T18602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2760.141584][T18602] ? sidtab_search_core+0x164/0x210 12:13:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x527}], 0xc7, 0x0) 12:13:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x7ffff000}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2760.146796][T18602] security_sid_to_context_core.isra.0+0x2fb/0x390 [ 2760.153303][T18602] security_sid_to_context+0x37/0x50 [ 2760.158691][T18602] show_sid+0x9b/0x190 [ 2760.162774][T18602] ? selinux_add_mnt_opt+0x200/0x200 [ 2760.168114][T18602] ? seq_puts+0xc0/0x130 [ 2760.172376][T18602] selinux_sb_show_options+0x485/0x550 [ 2760.178033][T18602] security_sb_show_options+0x71/0xb0 [ 2760.183537][T18602] show_sb_opts+0xcf/0x100 [ 2760.187967][T18602] show_mountinfo+0x593/0x940 [ 2760.192692][T18602] ? show_vfsmnt+0x420/0x420 [ 2760.197292][T18602] ? down_read+0x3b/0x90 [ 2760.201543][T18602] ? m_start+0x51/0x330 [ 2760.205733][T18602] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2760.211505][T18602] m_show+0x66/0x80 [ 2760.215317][T18602] seq_read+0x4db/0x1130 [ 2760.219576][T18602] do_iter_read+0x4a9/0x660 [ 2760.224089][T18602] ? dup_iter+0x260/0x260 [ 2760.228452][T18602] vfs_readv+0xf0/0x160 [ 2760.232615][T18602] ? lock_downgrade+0x880/0x880 [ 2760.237467][T18602] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2760.243537][T18602] ? kasan_check_read+0x11/0x20 [ 2760.248397][T18602] ? ksys_dup3+0x3e0/0x3e0 [ 2760.252814][T18602] ? wait_for_completion+0x440/0x440 [ 2760.258111][T18602] ? __fget_light+0x1a9/0x230 [ 2760.262794][T18602] do_preadv+0x1c4/0x280 [ 2760.267036][T18602] ? do_readv+0x290/0x290 [ 2760.271363][T18602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2760.276834][T18602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2760.282296][T18602] ? do_syscall_64+0x26/0x610 [ 2760.286974][T18602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2760.293052][T18602] ? do_syscall_64+0x26/0x610 [ 2760.297734][T18602] __x64_sys_preadv+0x9a/0xf0 [ 2760.302504][T18602] do_syscall_64+0x103/0x610 [ 2760.307270][T18602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2760.313163][T18602] RIP: 0033:0x458079 [ 2760.317082][T18602] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2760.336715][T18602] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2760.345770][T18602] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2760.353998][T18602] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2760.361990][T18602] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2760.369962][T18602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2760.378483][T18602] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:12 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x802, 0x0) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) r2 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="124a6b815bad36457888b404288bd3a55240ec201eb78adab6f046b6", 0x1c, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r2, 0xfff) [ 2760.407931][ T26] audit: type=1804 audit(1553170392.283:1597): pid=18565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5231/file0/file0" dev="sda1" ino=17217 res=1 12:13:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0xc7}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2760.458259][ T26] audit: type=1800 audit(1553170392.283:1598): pid=18565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17217 res=0 12:13:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc2d}], 0xc7, 0x0) [ 2760.574078][T18781] FAT-fs (loop5): bogus number of reserved sectors [ 2760.608584][T18781] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:12 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000240)={'broute\x00', 0x0, 0x3, 0xf2, [], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f00000000c0)=""/242}, &(0x7f0000000040)=0x78) 12:13:12 executing program 1 (fault-call:6 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2760.630935][ T26] audit: type=1800 audit(1553170392.913:1599): pid=18781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17731 res=0 12:13:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc3d}], 0xc7, 0x0) 12:13:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0xc7}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2000006a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2760.796522][T19045] FAT-fs (loop5): bogus number of reserved sectors [ 2760.830983][T19045] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2760.884140][T19115] FAULT_INJECTION: forcing a failure. [ 2760.884140][T19115] name failslab, interval 1, probability 0, space 0, times 0 [ 2760.899490][T19115] CPU: 0 PID: 19115 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2760.907838][T19115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2760.917924][T19115] Call Trace: [ 2760.921232][T19115] dump_stack+0x172/0x1f0 [ 2760.925578][T19115] should_fail.cold+0xa/0x15 [ 2760.930281][T19115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2760.936119][T19115] ? ___might_sleep+0x163/0x280 [ 2760.940988][T19115] __should_failslab+0x121/0x190 [ 2760.945963][T19115] should_failslab+0x9/0x14 [ 2760.950476][T19115] kmem_cache_alloc_trace+0x2d1/0x760 [ 2760.955874][T19115] ? seq_printf+0xbb/0xf0 [ 2760.955896][T19115] cgroup_show_path+0xca/0x590 [ 2760.955918][T19115] ? cpu_stat_show+0x940/0x940 [ 2760.969775][T19115] kernfs_sop_show_path+0x133/0x1b0 [ 2760.975010][T19115] ? kernfs_test_super+0x140/0x140 [ 2760.980141][T19115] show_mountinfo+0x248/0x940 [ 2760.984834][T19115] ? show_vfsmnt+0x420/0x420 [ 2760.989437][T19115] ? down_read+0x3b/0x90 [ 2760.993690][T19115] ? m_start+0x51/0x330 [ 2760.997856][T19115] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2761.003583][T19115] m_show+0x66/0x80 [ 2761.007400][T19115] seq_read+0xad3/0x1130 [ 2761.011691][T19115] do_iter_read+0x4a9/0x660 [ 2761.016221][T19115] ? dup_iter+0x260/0x260 [ 2761.020570][T19115] vfs_readv+0xf0/0x160 [ 2761.024764][T19115] ? lock_downgrade+0x880/0x880 [ 2761.029622][T19115] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2761.035699][T19115] ? kasan_check_read+0x11/0x20 [ 2761.040571][T19115] ? ksys_dup3+0x3e0/0x3e0 [ 2761.045089][T19115] ? wait_for_completion+0x440/0x440 [ 2761.050398][T19115] ? __fget_light+0x1a9/0x230 [ 2761.055083][T19115] do_preadv+0x1c4/0x280 [ 2761.059378][T19115] ? do_readv+0x290/0x290 [ 2761.063742][T19115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2761.069256][T19115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2761.074743][T19115] ? do_syscall_64+0x26/0x610 [ 2761.079426][T19115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2761.085501][T19115] ? do_syscall_64+0x26/0x610 [ 2761.090278][T19115] __x64_sys_preadv+0x9a/0xf0 [ 2761.094974][T19115] do_syscall_64+0x103/0x610 [ 2761.099578][T19115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2761.105472][T19115] RIP: 0033:0x458079 [ 2761.109374][T19115] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:13:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfcc7}], 0xc7, 0x0) 12:13:13 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@local, @broadcast}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000300)={0x100000001, 0x9, 0x0, 0x7, 0x0, 0x1ff, 0x4, 0x7f, 0x0}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e24, 0x8, @mcast1, 0xbf0}}, 0x100000000, 0xa, 0x0, 0x4, 0x1}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r4, 0x2}, &(0x7f0000000240)=0xc) [ 2761.129075][T19115] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2761.137596][T19115] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2761.145648][T19115] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2761.153631][T19115] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2761.161599][T19115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2761.169738][T19115] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x20010fb6}], 0xc7, 0x0) 12:13:13 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000040)={0x20, 0x1fffffffc000, 0x9, 0x7, 0x7}) 12:13:13 executing program 1 (fault-call:6 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x7ffff000}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x2000091b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x7fffee89}], 0xc7, 0x0) [ 2761.462742][T19601] FAULT_INJECTION: forcing a failure. [ 2761.462742][T19601] name failslab, interval 1, probability 0, space 0, times 0 [ 2761.494822][T19651] FAT-fs (loop5): bogus number of reserved sectors [ 2761.507425][T19651] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2761.517755][T19601] CPU: 1 PID: 19601 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2761.525844][T19601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2761.535905][T19601] Call Trace: [ 2761.539222][T19601] dump_stack+0x172/0x1f0 [ 2761.543572][T19601] should_fail.cold+0xa/0x15 [ 2761.548171][T19601] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2761.553990][T19601] ? ___might_sleep+0x163/0x280 12:13:13 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket(0x4, 0x6, 0xe6) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0xc4, r2, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x98b}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf31c}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x840) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f0000000000)='\x00', 0x1) splice(r0, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) [ 2761.558855][T19601] __should_failslab+0x121/0x190 [ 2761.563799][T19601] should_failslab+0x9/0x14 [ 2761.568313][T19601] kmem_cache_alloc_trace+0x2d1/0x760 [ 2761.573702][T19601] ? seq_printf+0xbb/0xf0 [ 2761.578047][T19601] cgroup_show_path+0xca/0x590 [ 2761.582819][T19601] ? cpu_stat_show+0x940/0x940 [ 2761.587592][T19601] kernfs_sop_show_path+0x133/0x1b0 [ 2761.592802][T19601] ? kernfs_test_super+0x140/0x140 [ 2761.597933][T19601] show_mountinfo+0x248/0x940 [ 2761.602624][T19601] ? show_vfsmnt+0x420/0x420 [ 2761.607231][T19601] ? down_read+0x3b/0x90 [ 2761.611513][T19601] ? m_start+0x51/0x330 [ 2761.615687][T19601] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2761.621418][T19601] m_show+0x66/0x80 [ 2761.625236][T19601] seq_read+0xad3/0x1130 [ 2761.629506][T19601] do_iter_read+0x4a9/0x660 [ 2761.634042][T19601] ? dup_iter+0x260/0x260 [ 2761.638395][T19601] vfs_readv+0xf0/0x160 [ 2761.642648][T19601] ? lock_downgrade+0x880/0x880 [ 2761.647514][T19601] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2761.653591][T19601] ? kasan_check_read+0x11/0x20 [ 2761.658465][T19601] ? ksys_dup3+0x3e0/0x3e0 12:13:13 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x2, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x7fff, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x400c000}, 0xc010) [ 2761.662889][T19601] ? wait_for_completion+0x440/0x440 [ 2761.668206][T19601] ? __fget_light+0x1a9/0x230 [ 2761.672895][T19601] do_preadv+0x1c4/0x280 [ 2761.677159][T19601] ? do_readv+0x290/0x290 [ 2761.681531][T19601] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2761.687000][T19601] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2761.692467][T19601] ? do_syscall_64+0x26/0x610 [ 2761.697153][T19601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2761.703223][T19601] ? do_syscall_64+0x26/0x610 [ 2761.707917][T19601] __x64_sys_preadv+0x9a/0xf0 12:13:14 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) [ 2761.712618][T19601] do_syscall_64+0x103/0x610 [ 2761.718894][T19601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2761.724791][T19601] RIP: 0033:0x458079 [ 2761.728704][T19601] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2761.748315][T19601] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 12:13:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2, 0x0) [ 2761.756804][T19601] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2761.764765][T19601] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2761.772739][T19601] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2761.780719][T19601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2761.788728][T19601] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x8000000000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x3, &(0x7f00000000c0)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'bridge_slave_0\x00'}, 0x18) fallocate(r0, 0x8, 0x8, 0xff) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x7fffefd6}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0xc7}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:14 executing program 1 (fault-call:6 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3, 0x0) 12:13:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4, 0x0) [ 2762.150991][T20515] FAULT_INJECTION: forcing a failure. [ 2762.150991][T20515] name failslab, interval 1, probability 0, space 0, times 0 [ 2762.208309][T20515] CPU: 0 PID: 20515 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2762.216361][T20515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2762.226964][T20515] Call Trace: [ 2762.230447][T20515] dump_stack+0x172/0x1f0 [ 2762.234804][T20515] should_fail.cold+0xa/0x15 [ 2762.239432][T20515] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2762.245251][T20515] ? ___might_sleep+0x163/0x280 [ 2762.250135][T20515] __should_failslab+0x121/0x190 12:13:14 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @loopback}}, 0x1e) [ 2762.255085][T20515] should_failslab+0x9/0x14 [ 2762.259604][T20515] kmem_cache_alloc_trace+0x2d1/0x760 [ 2762.264988][T20515] ? seq_printf+0xbb/0xf0 [ 2762.269334][T20515] cgroup_show_path+0xca/0x590 [ 2762.274112][T20515] ? cpu_stat_show+0x940/0x940 [ 2762.278885][T20515] kernfs_sop_show_path+0x133/0x1b0 [ 2762.284130][T20515] ? kernfs_test_super+0x140/0x140 [ 2762.289250][T20515] show_mountinfo+0x248/0x940 [ 2762.293979][T20515] ? show_vfsmnt+0x420/0x420 [ 2762.298612][T20515] ? down_read+0x3b/0x90 [ 2762.302862][T20515] ? m_start+0x51/0x330 [ 2762.307050][T20515] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2762.312789][T20515] m_show+0x66/0x80 [ 2762.316688][T20515] seq_read+0xad3/0x1130 [ 2762.320955][T20515] do_iter_read+0x4a9/0x660 [ 2762.325489][T20515] ? dup_iter+0x260/0x260 [ 2762.329837][T20515] vfs_readv+0xf0/0x160 [ 2762.334016][T20515] ? lock_downgrade+0x880/0x880 [ 2762.338897][T20515] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2762.345000][T20515] ? kasan_check_read+0x11/0x20 [ 2762.351526][T20515] ? ksys_dup3+0x3e0/0x3e0 12:13:14 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) [ 2762.355952][T20515] ? wait_for_completion+0x440/0x440 [ 2762.361248][T20515] ? __fget_light+0x1a9/0x230 [ 2762.365963][T20515] do_preadv+0x1c4/0x280 [ 2762.370238][T20515] ? do_readv+0x290/0x290 [ 2762.374574][T20515] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2762.380074][T20515] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2762.385551][T20515] ? do_syscall_64+0x26/0x610 [ 2762.390230][T20515] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2762.396305][T20515] ? do_syscall_64+0x26/0x610 [ 2762.401251][T20515] __x64_sys_preadv+0x9a/0xf0 [ 2762.405942][T20515] do_syscall_64+0x103/0x610 [ 2762.410643][T20515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2762.416559][T20515] RIP: 0033:0x458079 [ 2762.420461][T20515] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2762.440219][T20515] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2762.448642][T20515] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 12:13:14 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f00000000c0)={@multicast2, @loopback, @multicast2}, 0xc) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@ng={0x4, 0x12, "ad997591b186747a878ea33ab1b04f6e80c7f6"}, 0x15, 0x2) 12:13:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) [ 2762.456624][T20515] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2762.464601][T20515] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2762.472578][T20515] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2762.480552][T20515] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5, 0x0) 12:13:14 executing program 1 (fault-call:6 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x200008b2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x2000091b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2762.545319][T20977] FAT-fs (loop5): bogus number of reserved sectors [ 2762.570812][T20977] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6, 0x0) [ 2762.697163][T21015] FAULT_INJECTION: forcing a failure. [ 2762.697163][T21015] name failslab, interval 1, probability 0, space 0, times 0 12:13:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:15 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) [ 2762.798666][T21015] CPU: 1 PID: 21015 Comm: syz-executor.1 Not tainted 5.1.0-rc1+ #31 [ 2762.806693][T21015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2762.816842][T21015] Call Trace: [ 2762.820241][T21015] dump_stack+0x172/0x1f0 [ 2762.824689][T21015] should_fail.cold+0xa/0x15 [ 2762.829300][T21015] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2762.835134][T21015] ? ___might_sleep+0x163/0x280 [ 2762.840001][T21015] __should_failslab+0x121/0x190 [ 2762.844959][T21015] should_failslab+0x9/0x14 [ 2762.849567][T21015] kmem_cache_alloc_trace+0x2d1/0x760 [ 2762.855043][T21015] ? seq_printf+0xbb/0xf0 [ 2762.859387][T21015] cgroup_show_path+0xca/0x590 [ 2762.864158][T21015] ? cpu_stat_show+0x940/0x940 [ 2762.868955][T21015] kernfs_sop_show_path+0x133/0x1b0 [ 2762.874160][T21015] ? kernfs_test_super+0x140/0x140 [ 2762.879281][T21015] show_mountinfo+0x248/0x940 [ 2762.883972][T21015] ? show_vfsmnt+0x420/0x420 [ 2762.888573][T21015] ? down_read+0x3b/0x90 [ 2762.892818][T21015] ? m_start+0x51/0x330 12:13:15 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x7fff, 0x8, 0x9, 0x8, r2, 0x2}, 0x2c) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000000)) splice(r0, 0x0, r2, &(0x7f0000000200)=0xffffffffffffffff, 0x200000000008, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x8, 0x4, 0x7, 0x2f, r1, 0x4}, 0x2c) timer_create(0x0, &(0x7f0000000340)={0x0, 0x15, 0x0, @thr={&(0x7f0000000240)="529a8bc05601edcc8df835e28db4936e6e782a6e67e8825e7c893cee32b56b8d2f7b8470888972d0b25f94c36407bcdf1284b96afc7a1f2c6f4954db249b4da6069de05c1f82ba66a69e366cd66e6ebe48a7ea1046112ad80a694b1d8985ea6d012f1a4a1a2da6f0f04bea4f2a47d9d57596c717ad94f8270258c3eec211d5e357fbd4ed8573e6c6989e44cde2932122ae9d05094d8572058bb0a8f8ada35850218c5572e56774692c4055f110bd99cf061cc12ee60fee90081825222f30ea709f058cc200c602be4e6febd8546b8ce683f062ed9ccff6f96e446d0d44fb4df389d31bc770e67787d417bf7b85", &(0x7f00000001c0)="1351f959ee6758334874"}}, &(0x7f0000000380)=0x0) timer_gettime(r3, &(0x7f00000003c0)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) [ 2762.896981][T21015] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2762.902717][T21015] m_show+0x66/0x80 [ 2762.906528][T21015] seq_read+0xad3/0x1130 [ 2762.910879][T21015] do_iter_read+0x4a9/0x660 [ 2762.915392][T21015] ? dup_iter+0x260/0x260 [ 2762.919745][T21015] vfs_readv+0xf0/0x160 [ 2762.923916][T21015] ? lock_downgrade+0x880/0x880 [ 2762.928774][T21015] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2762.934850][T21015] ? kasan_check_read+0x11/0x20 [ 2762.939731][T21015] ? ksys_dup3+0x3e0/0x3e0 [ 2762.944163][T21015] ? wait_for_completion+0x440/0x440 12:13:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7, 0x0) [ 2762.949551][T21015] ? __fget_light+0x1a9/0x230 [ 2762.954325][T21015] do_preadv+0x1c4/0x280 [ 2762.958604][T21015] ? do_readv+0x290/0x290 [ 2762.962966][T21015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2762.968454][T21015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2762.973918][T21015] ? do_syscall_64+0x26/0x610 [ 2762.978733][T21015] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2762.984893][T21015] ? do_syscall_64+0x26/0x610 [ 2762.989588][T21015] __x64_sys_preadv+0x9a/0xf0 [ 2762.994279][T21015] do_syscall_64+0x103/0x610 12:13:15 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f0000000080)) splice(r0, 0x0, r0, &(0x7f0000000000), 0x101, 0x0) [ 2762.998880][T21015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2763.004778][T21015] RIP: 0033:0x458079 [ 2763.008687][T21015] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2763.028468][T21015] RSP: 002b:00007f05df222c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2763.036882][T21015] RAX: ffffffffffffffda RBX: 00007f05df222c90 RCX: 0000000000458079 [ 2763.044859][T21015] RDX: 00000000000000c7 RSI: 0000000020000940 RDI: 0000000000000003 [ 2763.052920][T21015] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2763.061155][T21015] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f05df2236d4 [ 2763.069143][T21015] R13: 00000000004c4aee R14: 00000000004d8408 R15: 0000000000000004 12:13:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x7fffef7b}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8, 0x0) 12:13:15 executing program 1 (fault-call:6 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x7fffefd6}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2763.230815][T21712] FAT-fs (loop5): bogus number of reserved sectors 12:13:15 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)) [ 2763.276831][T21712] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:15 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x9, &(0x7f0000000000)=[{0x7ff, 0x3, 0x4, 0x2}, {0x3f, 0xff, 0x4, 0x2}, {0x8, 0x7fffffff, 0x200040000000000, 0xfa}, {0x4, 0x10000, 0x1, 0x9}, {0x10000, 0x7, 0x2, 0x2}, {0x10000, 0xa9, 0xfffffffffffffc00, 0x1fe3cbb}, {0x4, 0x9, 0x4, 0x1ff}, {0x1, 0x2, 0x6, 0x4}, {0x6, 0xfff, 0x9c, 0x20c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40e00, 0x0) [ 2763.328445][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 2763.328460][ T26] audit: type=1800 audit(1553170395.603:1608): pid=21735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17024 res=0 12:13:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9, 0x0) 12:13:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x580}], 0xc7, 0x0) [ 2763.465079][ T26] audit: type=1804 audit(1553170395.653:1609): pid=21735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5237/file0/file0" dev="sda1" ino=17024 res=1 12:13:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x200008b2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2763.585528][T21986] FAT-fs (loop5): bogus number of reserved sectors [ 2763.594965][T21986] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa, 0x0) [ 2763.663025][ T26] audit: type=1800 audit(1553170395.653:1610): pid=21735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17024 res=0 12:13:16 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x6166, 0x400100) splice(0xffffffffffffffff, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000000c0)=""/175) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x3, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000180)=0x100000000) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000240)=0xb5) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x80, 0x0) read(r0, &(0x7f0000000280)=""/45, 0x2d) [ 2763.716966][ T26] audit: type=1800 audit(1553170395.993:1611): pid=21986 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16570 res=0 12:13:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb, 0x0) [ 2763.826806][ T26] audit: type=1804 audit(1553170395.993:1612): pid=21986 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5238/file0/file0" dev="sda1" ino=16570 res=1 12:13:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2b}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc2d}], 0xc7, 0x0) [ 2763.888191][ T26] audit: type=1800 audit(1553170395.993:1613): pid=21986 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16570 res=0 12:13:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc, 0x0) [ 2763.955376][T22221] FAT-fs (loop5): bogus number of reserved sectors [ 2763.967503][T22221] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x7fffef7b}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2764.011088][ T26] audit: type=1800 audit(1553170396.293:1614): pid=22257 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17024 res=0 12:13:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) [ 2764.129048][ T26] audit: type=1804 audit(1553170396.293:1615): pid=22257 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5239/file0/file0" dev="sda1" ino=17024 res=1 12:13:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xd, 0x0) 12:13:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc3d}], 0xc7, 0x0) [ 2764.231411][T22478] FAT-fs (loop5): bogus number of reserved sectors [ 2764.247937][T22478] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x626}], 0xc7, 0x0) [ 2764.266510][ T26] audit: type=1800 audit(1553170396.293:1616): pid=22257 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17024 res=0 12:13:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2764.345323][ T26] audit: type=1800 audit(1553170396.623:1617): pid=22478 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16818 res=0 12:13:16 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e20, 0x5, @empty, 0x100000000}}, 0x800}, &(0x7f00000001c0)=0x90) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x10000) pipe(&(0x7f0000000080)) prctl$PR_SET_PDEATHSIG(0x1, 0x35) splice(r0, 0x0, r0, &(0x7f0000000200)=0x3, 0x5, 0x0) 12:13:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xe, 0x0) 12:13:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfcc7}], 0xc7, 0x0) 12:13:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x34}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc2d}], 0xc7, 0x0) 12:13:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xf, 0x0) [ 2764.767171][T23032] FAT-fs (loop5): bogus number of reserved sectors [ 2764.802194][T23104] sctp: [Deprecated]: syz-executor.0 (pid 23104) Use of int in maxseg socket option. [ 2764.802194][T23104] Use struct sctp_assoc_value instead 12:13:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc3d}], 0xc7, 0x0) [ 2764.854062][T23032] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x3d}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x20010fb6}], 0xc7, 0x0) 12:13:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x10, 0x0) 12:13:17 executing program 0: r0 = socket$inet(0x2, 0x5, 0x4) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x7, 0x3, 0x4}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={r3, 0x9, 0xfffffffffffffe00, 0xe0, 0x4, 0x6}, 0x14) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x11, 0x0) [ 2765.196144][T23631] FAT-fs (loop5): invalid media value (0x00) 12:13:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfcc7}], 0xc7, 0x0) 12:13:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x7fffee89}], 0xc7, 0x0) 12:13:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x12, 0x0) [ 2765.250523][T23631] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x66}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:17 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x2, 0x101, 0x2, 0x4, 0x0, 0x7}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x13, 0x0) 12:13:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x20010fb6}], 0xc7, 0x0) 12:13:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0xc7}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2, 0x0) 12:13:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x14, 0x0) [ 2765.661035][T24396] FAT-fs (loop5): invalid media value (0x00) 12:13:18 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x18fad4817acd1889) [ 2765.720144][T24396] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x15, 0x0) 12:13:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3, 0x0) 12:13:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x7fffee89}], 0xc7, 0x0) 12:13:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x16, 0x0) 12:13:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2000006a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2766.026542][T24968] FAT-fs (loop5): invalid media value (0x00) 12:13:18 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200)=0x4, 0x8, 0x0) [ 2766.125366][T24968] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2, 0x0) 12:13:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x17, 0x0) 12:13:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4, 0x0) 12:13:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x7ffff000}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3, 0x0) 12:13:18 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000040)) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) pipe(&(0x7f0000000080)) 12:13:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x18, 0x0) 12:13:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0xc7}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2766.568950][T25557] FAT-fs (loop5): invalid media value (0x00) 12:13:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5, 0x0) [ 2766.632689][T25557] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x19, 0x0) 12:13:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4, 0x0) 12:13:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x8) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40000, 0x1) write$FUSE_BMAP(r1, &(0x7f0000000080)={0x18, 0x0, 0x3, {0x2}}, 0x18) splice(r0, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) 12:13:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x2000091b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1a, 0x0) [ 2766.896797][T26040] FAT-fs (loop5): invalid media value (0x00) [ 2766.956071][T26040] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6, 0x0) 12:13:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5, 0x0) 12:13:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1b, 0x0) 12:13:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:19 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) pipe(&(0x7f0000000000)) 12:13:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1c, 0x0) 12:13:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6, 0x0) 12:13:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x7fffefd6}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 2767.305891][T26564] FAT-fs (loop5): invalid media value (0x00) [ 2767.421937][T26564] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7, 0x0) 12:13:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1d, 0x0) 12:13:19 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x338, [0x20000240, 0x0, 0x0, 0x20000398, 0x20000548], 0x0, &(0x7f0000000040), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x44, 0x88be, 'veth1_to_bond\x00', 'erspan0\x00', 'syz_tun\x00', 'yam0\x00', @empty, [0xff, 0xff, 0xff, 0x0, 0xff], @dev={[], 0x15}, [0x0, 0xff, 0xff, 0xff], 0xd8, 0xd8, 0x128, [@realm={'realm\x00', 0x10, {{0x800, 0x8000}}}, @vlan={'vlan\x00', 0x8, {{0x1, 0x3, 0xaafe, 0x2, 0x6}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x8, 'syz1\x00', 0x2}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x5, 0x8, 0x88fe, 'vcan0\x00', 'veth1_to_bridge\x00', 'bond_slave_0\x00', 'caif0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x110, 0x148, 0x180, [@rateest={'rateest\x00', 0x48, {{'nr0\x00', 'gretap0\x00', 0x8, 0x2, 0x9, 0x1000, 0x7, 0x8f3, 0x200, 0x34}}}, @m802_3={'802_3\x00', 0x8, {{0xff, 0x7, 0x1, 0x6}}}]}, [@snat={'snat\x00', 0x10, {{@link_local}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x3b0) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000580)={{0x4, 0x3, 0x1, 0x5, 'syz1\x00', 0xfffffffffffffff9}, 0x5, 0x30, 0x100000000, r3, 0xa, 0xfb5d, 'syz0\x00', &(0x7f0000000100)=['\x00', 'erspan0\x00', 'vmnet1bdev*eth1-+\x00', 'wlan1\x00', '\x00', 'vmnet0\x00', 'bond_slave_0\x00', 'gretap0\x00', 'syz1\x00', '\x00'], 0x44, [], [0x1ff, 0x2a, 0x1ff, 0xc4]}) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000180)=0x6, 0x4) 12:13:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x200008b2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1e, 0x0) 12:13:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7, 0x0) 12:13:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8, 0x0) 12:13:20 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000000)) [ 2767.769950][T27333] FAT-fs (loop5): invalid media value (0x00) [ 2767.832097][T27333] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x7fffef7b}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) 12:13:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x21, 0x0) 12:13:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9, 0x0) 12:13:20 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'veth0_to_hsr\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}) 12:13:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x22, 0x0) 12:13:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8, 0x0) [ 2768.148264][T27957] FAT-fs (loop5): invalid media value (0x00) 12:13:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x55c}], 0xc7, 0x0) 12:13:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x23, 0x0) [ 2768.258058][T27957] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:20 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) r3 = getuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f0000000300)={0x78, 0xffffffffffffffda, 0x4, {0x0, 0x100000000, 0x0, {0x1, 0x2, 0x7, 0x7, 0x4, 0xb6, 0x6, 0x8, 0x7fff, 0x8, 0xffffffffffffea0a, r3, r4, 0x7, 0x10001}}}, 0x78) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x117, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x3, 0x757a, "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", 0xb5, 0xffffffff, 0x8, 0xfff, 0x1000, 0x100000000, 0x7fffffff, 0x1}, r5}}, 0x128) 12:13:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa, 0x0) 12:13:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc2d}], 0xc7, 0x0) 12:13:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x24, 0x0) 12:13:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9, 0x0) [ 2768.615891][T28425] FAT-fs (loop5): invalid media value (0x00) 12:13:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb, 0x0) [ 2768.675714][T28425] FAT-fs (loop5): Can't find a valid FAT filesystem 12:13:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x25, 0x0) 12:13:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc3d}], 0xc7, 0x0) 12:13:21 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x80800) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x600000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=@deltclass={0x464, 0x29, 0x100, 0x70bd2c, 0x25dfdbfd, {0x0, r2, {0xa, 0x1}, {0xf, 0x7}, {0xfff7, 0x7}}, [@TCA_RATE={0x8, 0x5, {0x9, 0x3b}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x428, 0x2, [@TCA_CBQ_FOPT={0x10, 0x3, {{0x0, 0xd}, 0x1, 0x1}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x1f, 0x7, 0x6, 0x401, 0xfff, 0x9, 0xfffffffffffff96f, 0x5, 0x3e6, 0x5485, 0x1, 0x74a, 0x7, 0x2, 0xe78, 0x43, 0x1ff, 0x5, 0x8, 0xffffffffffffffa1, 0x1, 0x1, 0x0, 0xd4b2, 0x3, 0x9, 0x7f, 0xc2cb, 0x0, 0x6, 0x6, 0x3, 0x2, 0x2, 0x100000000, 0x19, 0x1, 0x6, 0x1, 0xefbf, 0x9, 0x9, 0xfffffffffffffc01, 0x0, 0x7, 0x7fff, 0x6, 0xc50f, 0xe1, 0xd6ce, 0x3, 0x1, 0xffffffffffffffe0, 0x80, 0x80, 0x0, 0x2, 0x8, 0x0, 0x3, 0xfffffffffffffffb, 0x1, 0x0, 0x200, 0xb27, 0x657, 0xfffffffffffffffe, 0x80000001, 0x61, 0x3f, 0x0, 0x3ff, 0x1ff, 0xffff, 0x7, 0x40, 0x101, 0x8001, 0x4, 0x9, 0x401, 0x2, 0x401, 0x356, 0x4, 0xfffffffffffffff7, 0x0, 0x40, 0x9, 0x2, 0xfffffffffffffffb, 0x7ff, 0x8001, 0x3ff, 0x1, 0x8001, 0x3, 0x5, 0x6, 0x8, 0x10001, 0x5, 0x6, 0x2, 0x9, 0x80, 0x1ff, 0x6, 0x8001, 0x0, 0x3, 0x2, 0xd34, 0x7fff, 0x8001, 0x96de, 0x6, 0x981, 0x6, 0x1f, 0x401, 0x4, 0x8, 0x4, 0x9, 0xffff, 0xad, 0x2, 0x8, 0x8c3, 0x100000000, 0x10001, 0x7f, 0xdd5, 0x7f, 0x8001, 0x7fff, 0x9, 0x7, 0x400, 0x400, 0x2, 0x5, 0x9, 0x8, 0x2, 0x2, 0x2, 0x19bd, 0xfffffffffffeffff, 0x1000, 0xfffffffffffffffe, 0x8, 0xd16, 0x9, 0x10000, 0x1ff, 0xa95, 0x3, 0x80000000, 0x8, 0x400, 0x7, 0x0, 0x5, 0x7fff, 0x7, 0x6, 0x8, 0x8, 0x100, 0x9616, 0x8001, 0x8, 0x2, 0x200, 0x4, 0x101, 0x800, 0x101, 0x1f, 0x40, 0x6, 0x40, 0xbf4, 0x3, 0xfff, 0x4, 0x8, 0x340f57e9, 0x82, 0x4, 0x0, 0x30, 0x3, 0x4, 0x7, 0x5b8, 0x2, 0xcc, 0x843, 0x4, 0xcbb, 0x0, 0x496, 0x1b, 0x2, 0x28fb, 0x3, 0x5, 0xabd6, 0xe98, 0x8, 0x3, 0x8000, 0x7fff, 0x2, 0x0, 0xfbcb, 0x7ff, 0x3, 0x3, 0x1ff, 0x401, 0x9, 0x9, 0x1, 0x4, 0x6, 0x9, 0x1, 0xffffffff, 0x2, 0x40eb, 0x200, 0x13fd, 0x5, 0x401, 0x2, 0x4, 0x9, 0x8, 0x4, 0xff, 0x1f, 0x6, 0xffff, 0x9, 0x40, 0xffff, 0x2, 0x1, 0x5, 0x8, 0x4c35, 0x9]}, @TCA_CBQ_RATE={0x10, 0x5, {0x80, 0x2, 0x4, 0x7fff, 0x0, 0x3}}]}}, @TCA_RATE={0x8, 0x5, {0x5, 0x4}}]}, 0x464}, 0x1, 0x0, 0x0, 0x4000000}, 0x84) pipe(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) 12:13:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x26, 0x0) 12:13:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa, 0x0) 12:13:21 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0xf, 0x6, 0x4, "79e16bc352e386a47d4b1d625b13a2"}) r1 = socket$inet(0x2, 0x80000, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x10000}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x1f, 0x5, 0xfdc, 0x7, r2}, &(0x7f0000000340)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="96cc9c1c870c369014544c3a4d4691ee2c8da9984fec24b9ae6ebbf1e6896a6aa0187bb6cac31a84fe856c0f398a668224f9ab0389ab2a35ad137e4747eaef1dcaa0fa775d17866fe562db848562c5fcc00fe80c96712e6ce194d764e9c1896a63f796a64ab30be28b5e65b16b18b73fa5f48085c915439bbcb3a32be79626ceea9cf4f5a0f35c5e3513b5b3e22dc16dbb4d1312582c09a29d6b57a5c91915fc4b15b8671c7f0a93f4f03321cc04a5caa851b013c35c5a4da0b0350333c61ac172ba5daec568091da32273aa551e"}, 0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000240)) 12:13:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfcc7}], 0xc7, 0x0) 12:13:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x27, 0x0) 12:13:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc, 0x0) 12:13:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x28, 0x0) 12:13:21 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000000), 0x8, 0x4) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000040)=0x52, 0x4) 12:13:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb, 0x0) 12:13:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x20010fb6}], 0xc7, 0x0) 12:13:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xd, 0x0) 12:13:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x29, 0x0) 12:13:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc, 0x0) 12:13:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2a, 0x0) 12:13:21 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0x7fffee89}], 0xc7, 0x0) 12:13:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:13:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2b, 0x0) 12:13:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xe, 0x0) 12:13:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xd, 0x0) 12:13:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2c, 0x0) 12:13:22 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) 12:13:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2, 0x0) 12:13:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:13:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2d, 0x0) 12:13:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xf, 0x0) 12:13:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xe, 0x0) 12:13:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2e, 0x0) 12:13:22 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xfffffffffffffffd, 0x4000) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) socket$inet(0x2, 0x100000000805, 0x0) r1 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0x108070, r0, 0x0) accept4$tipc(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x80000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={r1}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000180)={0x3a}) 12:13:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3, 0x0) 12:13:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2f, 0x0) 12:13:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r0, &(0x7f0000000600)="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", 0x200) 12:13:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x10, 0x0) 12:13:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xf, 0x0) 12:13:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x30, 0x0) 12:13:22 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'mangle\x00'}, &(0x7f00000000c0)=0x54) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4, 0x0) 12:13:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x31, 0x0) 12:13:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x10, 0x0) 12:13:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x11, 0x0) 12:13:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:23 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='dummy0\x00') 12:13:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5, 0x0) 12:13:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x32, 0x0) 12:13:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x11, 0x0) 12:13:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x12, 0x0) 12:13:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x33, 0x0) 12:13:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:23 executing program 0: r0 = socket$inet(0x2, 0xf, 0x7) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6, 0x0) 12:13:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x13, 0x0) 12:13:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x34, 0x0) 12:13:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x12, 0x0) 12:13:23 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x35, 0x0) 12:13:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7, 0x0) 12:13:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x14, 0x0) 12:13:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x13, 0x0) 12:13:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x36, 0x0) 12:13:24 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000140)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff8, 0x10000) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000000c0)=0x1002080, 0x20) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) 12:13:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8, 0x0) 12:13:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x37, 0x0) 12:13:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x14, 0x0) 12:13:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x15, 0x0) 12:13:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x38, 0x0) 12:13:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(0x0, 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:24 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x501c00, 0x0) write$tun(r1, &(0x7f00000000c0)={@void, @void, @llc={@llc={0xfe, 0xdc, "8a3c", "306af17a428ffee8ab58af8446339bbc7cd020aba1667e6a697ec72489d66cf8cb4202eedbb1e7730b27fd3cd94d7fcec9dafac27e922d8e5eef855f2d359067ae5f09ae932795769a73987ee41f1746d8a253a9df2123950a042673606149bddf73d6068977d379fa0a72da0005382b6da450f006944df5464ace616b0d9b72985445c1687701da36009b7d83b3499fa90dc5f4690d170abe7a5c6f78509b2ffc"}}}, 0xa5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x15, 0x0) 12:13:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9, 0x0) 12:13:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x16, 0x0) [ 2772.511961][ T26] kauditd_printk_skb: 21 callbacks suppressed [ 2772.512008][ T26] audit: type=1800 audit(1553170404.793:1639): pid=1115 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=293 res=0 12:13:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x39, 0x0) 12:13:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(0x0, 0x24000, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:25 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = dup(r0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000000)={0x2, 0x1, 0x8, 0x101, 0x3, 0xf032}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) 12:13:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3a, 0x0) 12:13:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x16, 0x0) 12:13:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa, 0x0) [ 2772.858871][ T26] audit: type=1800 audit(1553170405.133:1640): pid=1586 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=294 res=0 12:13:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(0x0, 0x24000, 0xe) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3b, 0x0) 12:13:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x17, 0x0) 12:13:25 executing program 0: r0 = socket$inet(0x2, 0x805, 0x5) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) [ 2773.102297][ T26] audit: type=1800 audit(1553170405.383:1641): pid=1802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17003 res=0 12:13:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb, 0x0) 12:13:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x17, 0x0) 12:13:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x18, 0x0) 12:13:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3d, 0x0) 12:13:25 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40908000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x2d0, 0xe, 0x0, 0x420, 0x70bd2c, 0x25dfdbfb, {0xf, 0x0, 0x5}, [@generic="d17077ffac5ca022a8381feb9acba6a90e42ab9a2448d96cde268948cf43f58a6dc612da069e64ade0c3348a7220b24eaca480b4d60e4b0be784885a3c256985944193a56717aa1c7c767b0924bacd1fdc9187b8178cf797985f29b5d728d24462", @typed={0x8, 0x20, @ipv4=@loopback}, @generic="fab5fbbc7c20d6860f", @generic="9d372214c4c3ea50f9e173ca9237c0eacb7dbe3ae052bdfac18de781f122f4edb986179b2a2a3ce759f5ffefc77728204d84bd498d00fdf4eb37a0487ff43adeb30fb6049ea3a9fea1bbb525c61e41d3b7d4dff227f31d14c17ac459d7f0109c355f486df7c0525e3e7c32151869221794d286ea92ff413df591a918003ee57596b2879b6919e9595b5ec1c1c4e530d0a0e70e8059ef3060fd5ed991308a569729992ef23b1fa9b644190968f0b2b6c9ddf1ae64", @generic, @nested={0x194, 0x0, [@generic="86c7a6aef38fd71384365429d94a42bab77bda8c6207d224468f14cac1ca8c31cffa139222359a3f4036416deea94035e94e21741cb31f26e1785b514d184d436272ac9fe590848652a2568a4a19a014e6e8b11e25b21c4165a313bd5c697dd77f95727b088bfd0298651d5472924f1b3d008c2577c88211af4d93b3be72bac8ae56aa0ba7d1dd56c28c2260143196b17a24c37c4332c7", @generic="9959977c878ceb3905c0dc83eb45efe448d6c22528bfafc7ecabfca8d213874762e026d63e695a0979aecf9d5bf41bda5c3b3ba9af5b", @generic="08923b64f235484ff93c51ad1480458bc19a1a80287161ce3b9d0792069a41aea2a12597b60e3726deaf6105433cd94ee5ea7be1ac1ae0fe84e2f612a175b825c89667d3ee7a7bdc79b9c777a48b28f2d938bea8f5cd7eaf00658d70364012a6adb66b0f061e67c0893c329fcba2af61fb7bba17cc07a4ade6c46dcb9bef06f36176f3db8f6dd72bb0c66f8325a8287c57853d5c39bddb1f1ce116379cb4101c2b929482959bf78fd22c9a65947e37c0cfcb4d0eca71c46f4148997cb57da912262c"]}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x4000000}, 0x4044881) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 2773.457197][ T26] audit: type=1800 audit(1553170405.733:1642): pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17760 res=0 12:13:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3e, 0x0) 12:13:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc, 0x0) 12:13:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x19, 0x0) 12:13:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0xe) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:25 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 2773.589823][ T26] audit: type=1804 audit(1553170405.783:1643): pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5266/file0/file0" dev="sda1" ino=17760 res=1 12:13:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x18, 0x0) 12:13:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x41, 0x0) 12:13:26 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000000c0)=0x8, 0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) prctl$PR_MCE_KILL_GET(0x22) [ 2773.902639][ T26] audit: type=1800 audit(1553170406.183:1644): pid=2741 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=295 res=0 12:13:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x42, 0x0) 12:13:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) 12:13:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xd, 0x0) 12:13:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1a, 0x0) 12:13:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x19, 0x0) [ 2774.015436][ T26] audit: type=1804 audit(1553170406.213:1645): pid=2741 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5267/file0/file0" dev="loop5" ino=295 res=1 12:13:26 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x42) r3 = inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x2) inotify_rm_watch(r2, r3) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x43, 0x0) [ 2774.251078][ T26] audit: type=1800 audit(1553170406.533:1646): pid=3144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17783 res=0 12:13:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1a, 0x0) 12:13:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) 12:13:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x44, 0x0) [ 2774.338521][ T26] audit: type=1804 audit(1553170406.563:1647): pid=3144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5268/file0/file0" dev="sda1" ino=17783 res=1 12:13:26 executing program 0: socketpair(0x11, 0x1, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000001c0)={'team_slave_1\x00', {0x2, 0x4e22, @multicast2}}) socket$inet(0x2, 0x100000000805, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x240000) write$P9_RRENAMEAT(r1, &(0x7f0000000140)={0x7, 0x4b, 0x1}, 0x7) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000100)=0x1, 0x25, 0xe) 12:13:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xe, 0x0) 12:13:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1b, 0x0) 12:13:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x45, 0x0) [ 2774.588823][ T26] audit: type=1800 audit(1553170406.863:1648): pid=3628 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=296 res=0 12:13:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1b, 0x0) 12:13:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) 12:13:27 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) fcntl$dupfd(r1, 0x406, r1) 12:13:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x46, 0x0) 12:13:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xf, 0x0) 12:13:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1c, 0x0) 12:13:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:13:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x47, 0x0) 12:13:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1c, 0x0) 12:13:27 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0xa000, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000240)={0xe8, 0xfffffffffffffff5, 0x7, [{0x0, 0xc3, 0x4, 0x7f, 'bdev'}, {0x6, 0x8, 0xb, 0x9, '/dev/midi#\x00'}, {0x1, 0xffff, 0xc, 0x6405, 'cpusetcpuset'}, {0x3, 0x0, 0xb, 0x1000, '/dev/midi#\x00'}, {0x3, 0x6, 0x0, 0xc43a}, {0x5, 0xff, 0xb, 0x3, '/dev/midi#\x00'}]}, 0xe8) r1 = socket$inet(0x2, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x400, 0x100) epoll_pwait(r2, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x5, &(0x7f0000000040)={0x4}, 0x8) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) 12:13:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1d, 0x0) 12:13:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:13:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x10, 0x0) 12:13:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x48, 0x0) 12:13:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1d, 0x0) 12:13:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x49, 0x0) 12:13:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1e, 0x0) 12:13:27 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x1) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000000)={0x9f2, 0x4b2}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:27 executing program 5: 12:13:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x11, 0x0) 12:13:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4a, 0x0) 12:13:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1e, 0x0) 12:13:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4b, 0x0) 12:13:28 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfef3, 0x0, 0x0, 0xffffff77) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r0, &(0x7f0000000540)) lstat(0x0, &(0x7f0000000440)) getpgid(0x0) gettid() shmctl$IPC_SET(r1, 0x1, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) r3 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000440), 0x0, r3) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000200)={0x1f, {0x3, 0x0, 0x4, 0x6, 0x2, 0x4}}, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0), 0x1, 0x0, 0x0, 0x4c080}, 0x0) 12:13:28 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000040), 0x8, 0x0) 12:13:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x21, 0x0) 12:13:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x12, 0x0) 12:13:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4c, 0x0) 12:13:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x21, 0x0) 12:13:28 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000000)={0x5}) splice(r2, 0x0, r0, &(0x7f00000000c0), 0x8, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2b635160ee4270aa707520"], 0x5) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x2, 0x2, 0x40, 0x1000}, 0x8) 12:13:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x394e78b8) 12:13:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x22, 0x0) 12:13:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4d, 0x0) 12:13:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x13, 0x0) 12:13:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x22, 0x0) 12:13:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4e, 0x0) 12:13:28 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0x8, &(0x7f0000000000)='keyring\x00', 0xffffffffffffffff}, 0x30) getpgid(r2) 12:13:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4f, 0x0) 12:13:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x23, 0x0) 12:13:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x23, 0x0) 12:13:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x14, 0x0) 12:13:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x50, 0x0) 12:13:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000000)=0x7491) add_key$keyring(&(0x7f0000000700)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, &(0x7f00000004c0)}, 0x1) 12:13:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x1, 0x7ff, 0x5, 0x1ff, 0x3, 0x7, 0xfffffffffffffffc, 0x41, 0x40, 0x104, 0xffffffff, 0x8000, 0x38, 0x2, 0x6a, 0x8, 0x4}, [{0x6474e557, 0x20, 0x3, 0x5a, 0x100000001, 0x6, 0x0, 0xfffffffffffffffc}], "00f10b204a68ae0787637f62a02200fe3ce074676216df811785819cbaf9368a3001e343093ebb185ebcc9913802743492e4ef1ab6d756b34ffadc220418eae62ff2a1031d7f4cfe98234a2583c8f18343f66b2df7125af46ae6863cc5be4b0a481ea33ea591083f550e9e248997164fbbe688d51a33c5739e10e4342a5819529367d6cd880a0fd9c2b4299983654a9d52dc0fc0f3594f92e525", [[], [], []]}, 0x412) socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f00000000c0)={@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xe, 0x6, 0x10000000000, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000600)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4}}, &(0x7f0000000080)=0xe8) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x1000000, &(0x7f0000000700)={[{@xino_off='xino=off'}, {@metacopy_on='metacopy=on'}, {@workdir={'workdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}, {@metacopy_on='metacopy=on'}, {@default_permissions='default_permissions'}, {@index_off='index=off'}, {@metacopy_on='metacopy=on'}], [{@subj_role={'subj_role'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '])selinux#$[cgroup$:'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0x36}}]}) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000140)=""/9) 12:13:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x51, 0x0) 12:13:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x24, 0x0) 12:13:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x24, 0x0) 12:13:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x15, 0x0) 12:13:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x52, 0x0) 12:13:29 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xc124, 0x10001}) r1 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x25, 0x0) 12:13:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000240)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = accept(r0, &(0x7f0000000580)=@caif, 0x0) stat(&(0x7f0000000340)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, 0x0, 0xffffffffffffff77) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000440)={0x0, 0x1, {0x22, 0x18, 0x12, 0x1, 0x9, 0x3, 0x0, 0x15a, 0x1}}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000100)=0x4) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x24000, 0xe) write(r6, &(0x7f0000000600)="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", 0x200) sendfile(r6, r7, 0x0, 0x10000) getsockopt$EBT_SO_GET_INFO(r5, 0x0, 0x80, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000240)=0x78) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000280)={r2, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000300)={0x0, r8}) 12:13:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x53, 0x0) 12:13:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x16, 0x0) 12:13:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x25, 0x0) 12:13:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x54, 0x0) 12:13:29 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) setrlimit(0x1, &(0x7f0000002480)={0x2b, 0x2}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000002440)=0x5) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) recvmsg$kcm(r1, &(0x7f0000002400)={&(0x7f0000000180)=@generic, 0x80, &(0x7f0000002300)=[{&(0x7f0000000240)=""/9, 0x9}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/107, 0x6b}], 0x4, &(0x7f0000002340)=""/175, 0xaf}, 0x100) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000040)={{0x0, 0xd69, 0x0, 0x20, 0xffff, 0x6774}, 0x9}) recvfrom$rxrpc(r2, &(0x7f00000000c0)=""/185, 0xb9, 0x40, &(0x7f0000000000)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x3f, @local}}, 0x24) 12:13:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x55, 0x0) 12:13:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x26, 0x0) 12:13:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x56, 0x0) 12:13:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x17, 0x0) 12:13:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x26, 0x0) 12:13:30 executing program 0: r0 = socket$inet(0x2, 0x803, 0x7) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x1) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000140)=0x2d, 0x4) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000000)={0x29}, 0x29) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x1}, 0x10) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0xa5, 0x101000) [ 2778.164806][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 2778.164824][ T26] audit: type=1804 audit(1553170410.443:1659): pid=7271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5277/file0/file0" dev="sda1" ino=17075 res=1 12:13:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x27, 0x0) 12:13:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x57, 0x0) 12:13:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x18, 0x0) 12:13:30 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2000, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x5}, 0x10) r1 = socket$inet(0x2, 0x100000000805, 0x0) splice(r1, 0x0, 0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) r2 = syz_open_pts(r1, 0x80000) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000000)=0x7ff) 12:13:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x27, 0x0) 12:13:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x58, 0x0) 12:13:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x59, 0x0) 12:13:30 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x28, 0x0) 12:13:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x19, 0x0) 12:13:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x28, 0x0) 12:13:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) flock(0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffeee409017c8870da171c5c4922183ea39ce837cf697e67781a44c1305adc625227ad0419354670b93e7db1922a66d61e3e2d9a2169"], 0x1}}, 0x0) 12:13:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5a, 0x0) 12:13:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x29, 0x0) 12:13:31 executing program 0: r0 = socket$inet(0x2, 0x807, 0x40000000000004) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) readahead(r1, 0x0, 0x1000) 12:13:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x29, 0x0) 12:13:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1a, 0x0) 12:13:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5b, 0x0) 12:13:31 executing program 0: nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, &(0x7f0000000200), 0x8, 0x5) 12:13:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2a, 0x0) 12:13:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2a, 0x0) 12:13:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1b, 0x0) 12:13:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5c, 0x0) 12:13:31 executing program 5: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x7, 0x0, &(0x7f0000000140)) open(0x0, 0x0, 0x40) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r2, &(0x7f0000000400)="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", 0x180) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) sendfile(r2, r3, 0x0, 0xc7000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fef000/0x10000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000640)="61be5f9e53d7ba39967b7538e9690a39ecde4f8415ae33e6f88b57d497ec158231c2e64cdf3d1580155d", 0x2a, r1}, 0x68) 12:13:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5d, 0x0) 12:13:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2b, 0x0) 12:13:31 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003f80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000004080)={&(0x7f0000003f40)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000004040)={&(0x7f0000003fc0)={0x78, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x1f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = getuid() ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000280)=0x0) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001c80)=0x0) r11 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002100)={0x0, 0x0, 0x0}, &(0x7f0000002140)=0xc) lsetxattr$system_posix_acl(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)='system.posix_acl_access\x00', &(0x7f0000003e80)={{}, {0x1, 0x4}, [{0x2, 0x4, r12}, {0x2, 0x879e0783aa6a5a4f, r12}, {0x2, 0x1, r4}, {0x2, 0x4, r6}], {0x4, 0x3}, [{0x8, 0x4, r9}, {0x8, 0x5, r9}, {0x8, 0x4, r13}, {0x8, 0x7, r9}, {0x8, 0x4, r5}, {0x8, 0x4, r5}, {0x8, 0x0, r9}, {0x8, 0x0, r13}, {0x8, 0x3, r13}], {0x10, 0x4}, {0x20, 0x6}}, 0x8c, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003400)={0x0, 0x0}, &(0x7f0000003440)=0xc) lsetxattr$system_posix_acl(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)='system.posix_acl_access\x00', &(0x7f0000003d40)={{}, {0x1, 0x3}, [{0x2, 0x2, r4}, {0x2, 0x4, r12}, {0x2, 0x3, r4}], {0x4, 0x4}, [{0x8, 0x4, r13}, {0x8, 0x4, r9}, {0x8, 0x4, r13}, {0x8, 0x5, r9}, {0x8, 0x7, r9}, {0x8, 0x2, r5}, {0x8, 0x4, r13}, {0x8, 0x4, r13}, {0x8, 0x1, r13}], {0x10, 0x4}}, 0x84, 0x2) sendmsg$netlink(r1, &(0x7f0000003c80)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfb, 0x10000000}, 0xc, &(0x7f0000003bc0)=[{&(0x7f00000000c0)={0x130, 0x39, 0x300, 0x70bd27, 0x25dfdbfe, "", [@generic="c9a9212b3c40b83ebaeb6e2d8fbfb279f5aa4b735816d13cb486e16c9e3d84e4430fd395bbc7614c3f001879db6e7a8a5694ef3dd1480edf65dd5e85699596c9b4d1ac4e3863f877d6e383ab714bb640183c6c32346d4969fdfe543fc8a20d0b06050b3f88809cacb64dacbbb1b464a0c6f36def3b8bac0c47354b075bee9844de297664e3", @generic="98b5c6ac719702a784603097d5c0d0540e767000286dd1cc2fa9b42f50ea89f04ac86baa9aa3db096236cefd245dbf84f21694ffefcaa101c093cba22d6f41a3bd0c5e7a0187f7ff0f12258d1bcd923b4f4ef5b8d4ecb3719d69c1e69c87d8ccac8c066180bedf45c15f65dd3e21e6c115b993e5b9035b63e292bb6b2da83a171948303a00a0692fef81817750322c9ca390c5c6be7ba216aa81"]}, 0x130}, {&(0x7f00000002c0)={0x1344, 0x31, 0x20, 0x70bd2d, 0x25dfdbfb, "", [@generic="20fc544b71129da4546ef474a568e2f3b38f83ba1584c99deb1b142211b4c74501722aacb32b399d70f85854dc53e2846544965b37cc86759489dfa3293f7c272d3b64efa96e4ccb099130332aa651fb2e4167c936ed1fdb66578575eb28144680d8600f415d0272934e2ec00c561f2fe3ff38dedac64a12898e76684752c03b7a0579292294bf637e35a4de631b61718b49ae46de30bec06c425959ca858775d1aff64440dd5265d52f32442f7dce2d13416ef8c62b1ed477aa0577d8da1b988d9bec1139aa042aa0", @typed={0xc, 0x57, @u64=0x6}, @nested={0x11ac, 0xfffffffffffffffd, [@generic="70c5e2b2eaede6216a85c178cbd6cbfbb9541d7e393aba65222492cdffd2708fd0a4b7ef2a9352120194881bd4232a930ebffa6f12041ef0cf3cf8cf7037ca7bdbc69c065f12b85a88fce868b11a0a0e36dc382062b519200cf7a877cd9eef70f8592d7fd46c64fe8372cf0f4bab517326c7fddf78fd4967a45f400dd1a387", @typed={0x10, 0x1c, @str='eth1em0[[-^\x00'}, @generic="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", @generic="fa6db07b6ef693ba0632e1cc97ed5ff03a3d48e91bfe5c744ce60cf513eaa1591ba0b2bdfee55f58297647a50ed7b467678e9ff0fadbc82c590ee9794c6d214a9437e3527b67576ce537f47a2b6f2bddff891f72f6b2b2dc93b02c87d044a1a4a71172a579280e49a59240dd7ec0e903e7c2307af7def55f6de40c6fb383e0f140ad8c2bd7d6adb1bc9f13ee010a77afb9535c33df42274c547ddf771c6912dc812439ba6c1a42277221addf9740c7c2665c2ebb59d0094acb28765d68283b3025ecbad50bfc6455c4b5", @typed={0x8, 0x76, @uid=r4}, @typed={0x8, 0x50, @uid=r6}, @typed={0x8, 0x67, @pid=r7}, @generic="507fcc36b1392d54f21c9a535c81bb9ba08c1c8a84d65f161f9132dbe3e3298ad32b87b6b0e8d4d1d1a4b0b9696c749e6f4f482b90d7"]}, @generic="1ea656cda0396853f136351c875a3d97610849a4191992470ae2372bf546eb7a7d079e20cad16b00bf69daf9ed950c68762180633027faf25d782bd5382b16d85cb170e5b706d9f4727e49fc03802952cfa5144abaf99a2bcfb5c8d5a19590faff115c4ea6e1b037c20dd00fb305a33436bbf40392cd7296d6863fb5417c641772ac358d7908b1ebf12dd8e124ed5ee98c0e356d2a88b4370565e3b03773f79ab2a6d15999", @typed={0xc, 0x72, @u64=0x6}]}, 0x1344}, {&(0x7f0000001640)={0x230, 0x3b, 0x204, 0x70bd27, 0x25dfdbfb, "", [@generic="9fafa9986ee8ab2b2ce61158ae24aef7da2bccd474b0b3a55c794eb427c45d717da8fb67649ec42cf17849cb37522f7aa55f1e5a45c3bec26a7d49645a06dad2e4dc14eb571345f28237e8625b76fa1f880f2601111518f88c334b6ab844e60ae6cfc7740c50e6ef007faec291c132202f0d594b86ee727a4702cb40c43f0fd6b2e1a121cc8c327550ed4b9c64ddf79c3660f197b5ecbc4fcc05bbd8fe9a7bc19c93621456befd96834944d8ddcc66a90cf581e07b197f92bf3c4d1a5a6f660871e6a74a5e12e450d7", @typed={0x4, 0x8f}, @generic="9e397e6f496bfa2d8c78b398a299ed52450890c5df73c57aa721194d7404fbb594652bae50e9747fc889d211c13df477addd42b55bd13adf00d59c13ff5c235288d66a35e188a3891d4cefcf525c40e802c73ecdaaa056ebf2e193fa52fab36e510017dfffa2f7acb5464affdc203a4c0354df1383c5f0bc7c09355ce122084c7246755382b6b8f8b6bb289b428c95eb770eacc47d459c271094b9fb4e2bbd38bbc1d2235f7bfa2da7bf9f5da17717c62f73ec21719691df493e06d2d857e8138db3e84e54e608f6102f7e6bd4cee0e2033b4783c2761f654d2c9d53ccee4fab92a3ecc0655941fd8ea3fe52fa0b5152aba99899fe8a", @nested={0x44, 0x83, [@generic="e4ef1777bb332d2e17b197a58c2e347d80a5baa00f3cb076a572a8a057e83cc680d37758481ab8efd4b4b93c32f87c9e5a8677ee877a74c43f991f18650bc6cf"]}, @typed={0x14, 0x4c, @ipv6=@empty}, @typed={0x4, 0x28}]}, 0x230}, {&(0x7f0000001940)={0x314, 0x19, 0x322, 0x70bd27, 0x25dfdbfe, "", [@nested={0x1a4, 0x2f, [@generic="5c2bb2cdcacace34785957cd02a764afd2e187fc10f33f3b48f15c60ec41a20da5b990205fedefe92a330a9d5bb1ab75d306ddf9a26535da30acbc507c777164c42653f12aeb9cda96c59b4aaacbe1277f20567f7ce9e7d86e3687b13b065d294b1cf4115f1dd53fac1251af51268b612d9bfc4ad9e87ecb99ad74d85e3d9a16d94e838725b2c7d16653c6c7a4c2e6b4ad1b24c5e3046ee77291ea0d7c1b217c3ca29ec4cd646f3f24a12d15a44d3a20643e9b986bed344cfc", @generic="f9c9ed805f6e22bf22517e70f0d54ba19d7f52d767c616f4647dd8ab9444f0ba88d5e06db5ae2743ce2c1870349e7baaa33566352c034aa32acf1043e685e6df846dcf78b081ce7ff9c0551d8ca933db5c9c87f18ef83fb12aee1c570ae38e3955a53181fcc2b1da5850dc410286be0701422d95ef38b3e21a135b41e941130940525e61bc1d06ba1adcb1392f10c040166c34ed6df9", @generic="33380f210b191e0063c397e3a7bb990b12d55f", @typed={0x8, 0x23, @fd=r2}, @typed={0x10, 0x1a, @str=' cpuset#\x00'}, @typed={0x14, 0x86, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @typed={0x8, 0x8, @ipv4=@multicast1}, @typed={0x8, 0x27, @u32}]}, @generic="e311", @generic="e54bc9c4639196a4bc3fdff59508442139f05a62c5c748537e67e4ea1a152f91b5f70d0b95f52ea5fc2365d9c9c270604376efa96525cdb677cd6f587065fb7d1a8daf4fe4f31e58e30b423c62244066fc5b56f225450d1919d9ba295378f66c9a02efa69a9bb8943749e3d77bff", @typed={0x8, 0x25, @uid=r8}, @generic="921e5e873dca94b57978dc0b59f07a0c1d7ad9d2988a8c", @typed={0xcc, 0x79, @binary="4dffe167b06879d91bc6641396796aa4cc8c4a4d1d51437be6469ae5d2264e25772f2d0680c40a1c9162d6c12739fec69b03f7cbe059fbd64b5de054e10aa9d14b487ae85d1a20994de58fd538173aab03e27c9d55a7aa6b50b3e0c4cd8b9deb5588895bbc1535c0b3b9fa477865c1ae6b7e2288d88d6a6d6681bb4fc9a9e54dedfb1a4fcd37b0e1baf2776aa529305ad93314e395f6c4d63f8c82bfb3924829f23126b6f21186860a49b83bf2eeeb7d5f0c8c3008b181f91d0a547dbbc414e4685e9889c99074"}, @nested={0x4, 0x32}]}, 0x314}, {&(0x7f0000001cc0)={0x404, 0x41, 0xb30, 0x70bd2b, 0x25dfdbfe, "", [@generic="7828682a8eecf9d393eea819c1ea8bf7bf70f9b48958d2f23b1c387194f7b22fc1f7e60f592a44fd1c688c50a40f4a7c29742fd40bd930408b8b6ef0c2d7135ce4c1377e4440b9e078b430faf01a3becb792cec2db8cdee57e80890a68343e9ab0", @typed={0x8, 0x68, @pid=r10}, @nested={0x388, 0xc, [@generic="eaff0e2d68455e5f705c2ed0c75e5c50dc569f9fa5a9ca422bfbc16fd31cdacb8f67ab6e4ed1b028ef9d1985074f0b705ada0ef1688d87b4dd0f41289a037219f5f0958100557f81211b4c6c259dbac51a57faafdf818c5c38e6c67c73e4a6a486cb6dcc7effabec35fb5ad2bca8ea3895ccb6bb4efc0105983cea274c21ef6ef574f009135f0ffb1a6b62904add5ea0bf5ed47e5a4fd3f912ec6ca9d16c3ae0f792c15f9f4f2411662985ff10ec93619d66a324f7ad501ae4809853841d5a3e3d0b768bc1f269616e0a2040e8699ee36d4d5ece55f81e12526a04cde7aa8b3c24f4dd22e7e3", @typed={0x8, 0x57, @u32=0x9}, @typed={0x4, 0xa}, @generic="f6fc0db374d1f71b0f56785fde6656dd49c1c13567670bf96267280e2ac334a7aebdab80a94e7b168aa6e41e8af3b627b11e3ce385897cb40a6b3b6f2cb2ba5b233b9fdb7d0679dc3c666bfd3ecfc326d3f0370de7c104ea0044a425fa900b2147d6a7c458c5ce7958523693b424c66196fe3513f6ae5a851f49dfefc8807e29c5178b694d9726f336", @generic="38d2a8f9b8adb0e3f7ffdc6e08a69b6b42ccd77caa13db90436e343c58ab75363946615057b6052b155dde2448d30b6427d8221ca2690b3a002f8e16389c7449ddf795b4a197cef1a79eb4f1b7bb189b7b47c2005c95b5895c41f1f1a640131d8ed13583fc94ed91ac40b59515faff57c5e9357111fce6d299ca6780bbc98fb4783c1268b26a2ce1bf4e0238a79bc56921b679b3c10af83f7aa720ec71179822fe44ff215f408b6e5c362c60950a30ee87be3250d85a45f5c2595d34cac247bfdfcf611d83048922ad20e6a24e1b80c73789b5ae25e11d9f5245207447", @generic="8456e0e878e6754c6e2307fa7419c209b08ef055c8416c84e4a7d7492239cee73fd4f0d904d309f4f7d54b030377e78de0abeb9de94d2fb0397781fe8a5413c109fc92f1d4a5c3bb11cfcb6c221e27e91ae0ebe81bc583832ac1491420a2a5c70c1211b8e858255a370134", @typed={0x8, 0x83, @fd=r0}, @generic="99ce5d1a4c6278d9e7825e311410d9303b04de12eae48ac8b22c16bdf38ce1d1511bbe9bfa1044594ad3d7b421dd7fe9e54b01541d13d2d37a507329f6edd429af7042c7dbadd3c099e60120d84d3799ba735776e47fcd8a8123153c637251ff100a277c3c2271c90e374f9b9ae51746f8be362e967487ca58581990b8fef4a53cf6f8c77b5f2d8e66ff70e61785065e3f82dc6f3c3f2eb8fe8fa523671f9be93a92a159384cfd66b6a1740525f20d615be2b55ea8fb"]}]}, 0x404}, {&(0x7f0000002180)={0x1254, 0x29, 0x10, 0x70bd2d, 0x25dfdbff, "", [@generic="0d52141ed9c77b6a1b80e04923bf58b2db0ee04182e651d87a328546685d00926e478b3cd6cf74c272f15df56be54600fc9212c61d38d97599e12c25a275f9858f2e4f5692963ac1577f0d6c93af5449232bec190ae31be909eabff59aefcaff22e96776ec3de2ee220d0eff1de8759dfa0a67881ce8421a9d8c", @nested={0x10e0, 0x62, [@generic="a9348f288b61b46a947351020d7db702ce10b30695260526d3010ba73a1f33356e33af7fc7b387c5e20fb19a320bc24672774cf6dde391bd319c15a74228096825922d274ab19a74923b832dd95dd03191c455c749cf9cd147c00b30b68efcb9fae74b6a9526a4fc1d87cafa16b3189ec75da7e11200a4eb35adaf1253f79fabc0ad5c92b2a9b0589afe6433fd96c03dc8d83e88dbbe3d8262636afe360ac353d5bd2109ce69a22ce7d142386440aad969b9473d60f8", @typed={0x8, 0x4a, @str='em0\x00'}, @typed={0x8, 0x18, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x1004, 0x37, @binary="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"}, @typed={0x8, 0x48, @uid=r11}, @typed={0x8, 0x2b, @uid=r12}]}, @nested={0xe8, 0xc, [@typed={0x4, 0x30}, @generic="6003f85ec8c3811b5c0f4d9bd3f0f74adbdcdf72634bd03f053b9f316f03b520806e4779cedafd4773786560c9f5e051d509c18a48cd80b127a0b487f2beb047c39326454ed3532afb2ef04a8ad12d2cbe5da20b5fbbe43b961b0d542497376bf51b11ad16e972af2b6b25ece89db4c1cde2689a5c003ef1fa0b0bc1ed02cbc8bc8f25116ea6073fa861f97d213972d3dd7f4dfd950030ef3fb6e38bc11627b9f48278991c3dea45561af266c20b1593ae38852dbc7d81f7a03a9164b6dd7c13248ea75563c743c659f8da29e63aa8dfab3aa5d4141c07306f9c0272fdb5"]}]}, 0x1254}, {&(0x7f0000003480)={0x454, 0x1a, 0x0, 0x70bd26, 0x25dfdbfc, "", [@nested={0x1e8, 0x7, [@generic="b033637d5ff64a622c7e4fb9f0e95c4022905a6f1cf538c5dcc79495795dc4e2ec46e7a7df8a90459754abc09f64013826836337879ff8a0426a145de09f024ae9cbcb282795a611e9408d0efc9756d894f339699ea787f06f27c47cdb3ae8d4e914475172ccbf7df97175db3ea6f8e5454ed805e4066522d44305753bd3eb9ea05bf57190a198405353cbfbdb89cc148c05494d20772aeda3a03720523e41d20e7e878f718ef3a8fb7c0365d1b32431785d2c3980645c36061ca6c6bbf0acaa403a6d6f771ec7c4f262fdefda95685474bd77b864852b27e371b983efe76e16dfcfc30e5be7d626d4f83f814d2e87824c066c79aef32a", @typed={0xec, 0x86, @binary="0630c5f90377cd6a951d77dcbfc8187e9f03d6153e9f1fc0d480015d47cc731bcf2111a9abeeba7ca63db9f3bd107c0814e89f6567e5aec6032e38be327663c2ce4ebd5ab5b79ac41edb8531b809fe0687999e6fb2040e2958a6a47367e331b379836662d27294bce07687065917fc71f23b07f7c84c7223b11f5d460e44b956b90f26ac1d11852663749f26931aa6b95434bf86a2261e26d6b8bd5f17d77779ded4ccf9035c1b5be95a4e273215befa67aa045612667614fd1e491d61fbe1fa4d47c5d0621de4b7b6fcb76b2e3c383833adecd66008042f83f661d295f6e98b410578257871"}]}, @generic="9e51a2a1e5eac74f694ebff1362ac6a34879e80e11820c5d2baf41aaeaa7fbceb7572223b6bf8d0a94d71b5ccbba94", @generic="a0c3f971f829d9a8aa2a5ba64f2f7082735afdfd462bfd2b609ad844eb98c808bb2d22392cf59a27043f25c221685dfd5f120d248aae342fedca4ffea776168bb9953669f450eac51cbe6cf4f88598c935ced60027ec3f602ef668ecf181c362cdee01f7860137d25ba288ebd724ea45e1a945cc584f5a5190c07af12429ad5d6af2bb413c5f651eff13b023b57caf4cb09980751e01ce44f4bd7f375644be44626e83878bb9e5a375cbeda51c0ce26498f666e0e7606f1b09d5d758b7a2549c13619fccd9d0730040a15ce48efc9883671ce21660b62fa9195c98c429b402accf29305778baf865cbc35608ddebd4c1d7154891e66993", @typed={0x8, 0x4b, @uid=r14}, @nested={0x12c, 0x6, [@generic="50bd1964ad4b8ebd464f51366958e41c51d124a01c2572721a150e28a7d12c57098894", @generic="3fe825cad7a38cf42bba742e326497ba93c4edf24b82aeb409f727ff04bcde2cc87887f5110141f2cf48fee80c1cb1e5932f3ab720de6b090c6fa19c3a40514eef065ca877570d089ba60cb407485b3f1000af", @typed={0x14, 0x70, @ipv6=@dev={0xfe, 0x80, [], 0x15}}, @generic="ca34eea267311767523b18cccbc49e7a6af47ac6c1dc6bc23d10563c6a2973ddb0bd9af7861c391b5bfebc2b427b2f2d0859210e8ff9a266bf82bb47b9f79b3e935cf5358328ac7678f4ad840329dee4e82bbf23bf4e7831396b05fc35f222d3f643df2d2f6393e9cb285c945fe526cec8cb618a40a5e7421d7b29455dec98ab0107a0fb9b75358b4e207a2c0ee9f1372031a84e", @typed={0x8, 0x84, @u32=0x1}]}]}, 0x454}, {&(0x7f0000003900)={0x294, 0x20, 0x904, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x1d8, 0x2a, [@generic="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", @generic="98246fa532a2eaca2ea0b936d7abf1eaa2894c31b966e3a56f9e99ffa00ad30f9770461d8c1444ef", @typed={0x8, 0x24, @u32=0x6}, @typed={0x18, 0x5b, @binary="dac7a319d7eb2401e6dd39b39fd7716ac1"}, @generic="3657327d643a1f160f", @generic="e673f7934f771fa87e60974ed35dd0439d1b92e9f9a2e0c245af19a8505f39f21d80d64a9f205eac381ab75afe932d2d05d0208c47fe5b51a254c5f590de3867c69c043067e10256e63aa68132f757762d92e211d4ab99464dd5296c8254946afeaf0d2b61", @generic="bcb02ccd2ee707c6e2f330b964039cd7b79641f7512b4bc2fdfbd8a7b8c3fb4d"]}, @generic="ee2c680d8369a40490a0970faf92be4c251dbcfdcc81ff4681169f9f4c1dcaaf742e0ec652cdb38684bc1aa63942e665a4d64484f7261ef98c7a8452ea0e32118061f4ca84d48ffc9b9467c73f429cf65261aba15fd6399b250568c2617867e3bb89077e4290fc8330cf1bdecadfc97c0bddff3a9ec7fa8de1594456ba9b31af7e9af41377e242abec78928fb7a724f73c2a336043fae91e4fa47e1e787915851427a7a63ca8430c3fbfec"]}, 0x294}], 0x8, &(0x7f0000003c40)=[@rights={0x30, 0x1, 0x1, [r1, r0, r0, r0, r2, r0, r2]}], 0x30, 0x20040001}, 0x4000004) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1c, 0x0) 12:13:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2b, 0x0) 12:13:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5e, 0x0) 12:13:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2c, 0x0) 12:13:32 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000000c0)=""/113) r1 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000000)={0x9}) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xfffffffffffffff7) 12:13:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1d, 0x0) 12:13:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5f, 0x0) 12:13:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2c, 0x0) 12:13:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x40014, 0x0, 0xffffffffffffffdb) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, 0x0}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000000), 0x4) prctl$PR_SET_SECUREBITS(0x1c, 0x4) 12:13:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x60, 0x0) 12:13:32 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="57b00400010100020400fd0f"], &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r2, 0x3}, &(0x7f0000000100)=0x8) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2d, 0x0) 12:13:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x1e, 0x0) 12:13:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2d, 0x0) 12:13:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x61, 0x0) 12:13:32 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffe00, 0x204440) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000000c0)={0x9, 0x2, 0x5, 0x0, 0x0, [], [], [], 0x3, 0xb40}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2e, 0x0) 12:13:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x62, 0x0) 12:13:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x21, 0x0) 12:13:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2e, 0x0) 12:13:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x40000002], [0xc1]}) 12:13:32 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)) 12:13:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x63, 0x0) 12:13:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2f, 0x0) 12:13:33 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0xde) splice(r0, 0x0, r1, &(0x7f0000000200)=0x4000000000000, 0x400, 0x2) 12:13:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x22, 0x0) 12:13:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x64, 0x0) 12:13:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2f, 0x0) 12:13:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000480)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 12:13:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x30, 0x0) 12:13:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x65, 0x0) 12:13:33 executing program 0: r0 = socket$inet(0x2, 0x100000000803, 0x0) membarrier(0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) write$binfmt_misc(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1b7) 12:13:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x23, 0x0) 12:13:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x30, 0x0) 12:13:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x66, 0x0) 12:13:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x40000080], [0xc1]}) 12:13:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x31, 0x0) 12:13:33 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) fcntl$notify(r0, 0x402, 0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x24, 0x0) 12:13:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x67, 0x0) 12:13:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x31, 0x0) 12:13:33 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xa0001, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0xffffffffffffffc0, 0x8, 0x1000, 0xc, r1, 0x800}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x80, 0x5, 0x2719, 0x6, 0x1000}, 0x14) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r2, 0x80}, &(0x7f00000001c0)=0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) 12:13:33 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) write$binfmt_misc(r0, 0x0, 0x0) 12:13:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x32, 0x0) 12:13:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x25, 0x0) 12:13:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x32, 0x0) 12:13:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x68, 0x0) 12:13:34 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f00000000c0)=""/89) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000040)=0x1) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000180)={0x0, {0x0, 0x9e5}}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e23, 0x928, @rand_addr="9aa3bdb8f37809f3d3b0a587fe897506", 0x6}}, 0x2, 0x7ff, 0x100000001, 0x68eb0000000000, 0x90}, 0x98) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, &(0x7f0000000200), 0x8, 0x0) 12:13:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x69, 0x0) 12:13:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x33, 0x0) 12:13:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x26, 0x0) 12:13:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x33, 0x0) 12:13:34 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x200) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x1) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6a, 0x0) [ 2782.088482][T14439] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 12:13:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x34, 0x0) [ 2782.158840][T14439] (unnamed net_device) (uninitialized): option all_slaves_active: invalid value (255) 12:13:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x27, 0x0) 12:13:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6b, 0x0) 12:13:34 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x80000000000001, 0x0) 12:13:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x34, 0x0) 12:13:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x35, 0x0) 12:13:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6c, 0x0) [ 2782.433607][T14957] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 2782.455061][T14957] (unnamed net_device) (uninitialized): option all_slaves_active: invalid value (255) 12:13:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x28, 0x0) 12:13:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x35, 0x0) 12:13:34 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000280)={0x3, @null, r1}) r2 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x3, '\x00\x00\x00\x00\x04\x00', 0x14, 0x2, 0x51}, {@remote, 0x4e22, 0x10000, 0x1f, 0x6, 0x3}}, 0x44) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) splice(r2, 0x0, r4, &(0x7f0000000200), 0x8, 0x0) bind$rose(r5, &(0x7f0000000440)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x2, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @bcast]}, 0x40) fgetxattr(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="7300000000011ed192705100000000"], &(0x7f0000000140)=""/135, 0x87) 12:13:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6d, 0x0) 12:13:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x36, 0x0) [ 2782.710274][T15353] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 12:13:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x29, 0x0) [ 2782.775429][T15353] (unnamed net_device) (uninitialized): option all_slaves_active: invalid value (255) 12:13:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6e, 0x0) 12:13:35 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000100)=[0x0, 0x2], 0x2) r1 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x36, 0x0) [ 2782.910895][T15647] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 2782.921661][T15647] (unnamed net_device) (uninitialized): option all_slaves_active: invalid value (255) 12:13:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x37, 0x0) 12:13:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6f, 0x0) 12:13:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2a, 0x0) 12:13:35 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000000)={0x6, 0x5, 0x800}) 12:13:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x70, 0x0) 12:13:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x37, 0x0) 12:13:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x38, 0x0) 12:13:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x71, 0x0) 12:13:35 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:35 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$x25(r1, &(0x7f00000000c0)=""/197, 0xc5, 0x40, &(0x7f0000000000)={0x9, @remote={[], 0x2}}, 0x12) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x38, 0x0) 12:13:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2b, 0x0) 12:13:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x72, 0x0) 12:13:35 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x39, 0x0) 12:13:36 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:36 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x73, 0x0) 12:13:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2c, 0x0) 12:13:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x39, 0x0) 12:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 12:13:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x74, 0x0) 12:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 12:13:36 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3a, 0x0) 12:13:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2d, 0x0) 12:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 12:13:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x75, 0x0) 12:13:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3a, 0x0) 12:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 12:13:36 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000000c0)={0x1f, 0x2, 0x3, 0x2, 0x3, [{0x0, 0x1, 0x1, 0x0, 0x0, 0x100}, {0xfffffffffffffff8, 0x2, 0x3, 0x0, 0x0, 0x2300}, {0x8, 0x9b, 0x2, 0x0, 0x0, 0x2304}]}) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x40}, 0xc) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) 12:13:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3b, 0x0) 12:13:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x76, 0x0) 12:13:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2e, 0x0) 12:13:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x77, 0x0) 12:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 12:13:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3b, 0x0) 12:13:36 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x4, &(0x7f00000000c0)="a6485a10e3f68234f2ee46361317307d63fcf9818b7f7adb9434cca733b6951aabbcb0d5b0fd8f98395bc6c67fbcc12df340adc3778b5cd037d2f2c809b6b6d51361ab7dd053a7dc75aae746c28d0fe7e998d9098413a7758831c42da72d0db5761c9e636b2c6872d1b0e4f31c9bfaff277d098eeabc1ebf75209517b3ded1ba9824f4cb3f72a73bee87301bc7b1cb98633b0d15ab5827d68ce01d9f419575cb44c59537dd8c8ebb8c91a3a4d023719162f29bad5408789563923b4efe2693d4f34364a8d0374230a3efd72cb516dcc2dfaab1cdecccb22037b0c032ecf9f39f430c99f0b685b5f1") 12:13:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 12:13:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x78, 0x0) 12:13:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x2f, 0x0) 12:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 12:13:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x79, 0x0) 12:13:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3d, 0x0) 12:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:13:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 12:13:37 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000000)=0x400, 0x4) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7a, 0x0) 12:13:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x30, 0x0) 12:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:13:37 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000240)={r0, 0x6, 0x40, "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"}) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000000), 0x2) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7b, 0x0) 12:13:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3e, 0x0) 12:13:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3d, 0x0) 12:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 12:13:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7c, 0x0) 12:13:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x31, 0x0) 12:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7d, 0x0) 12:13:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x41, 0x0) 12:13:37 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x800, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e22, 0x3, @empty, 0x3}, r3}}, 0x38) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3e, 0x0) 12:13:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7e, 0x0) 12:13:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x32, 0x0) 12:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 12:13:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x82, 0x0) 12:13:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x42, 0x0) 12:13:38 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x41, 0x0) 12:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 12:13:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x83, 0x0) 12:13:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x33, 0x0) 12:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 12:13:38 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="05000302c2db1d12"]) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x43, 0x0) 12:13:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x84, 0x0) 12:13:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x42, 0x0) 12:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 12:13:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x34, 0x0) 12:13:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x85, 0x0) 12:13:38 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='attr/sockcreate\x00') ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)={0x40, 0x7, 0x5}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, &(0x7f0000000000), r0, &(0x7f0000000040), 0x1, 0x1) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000000c0)=0x1) 12:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:13:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x44, 0x0) 12:13:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x86, 0x0) 12:13:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x43, 0x0) 12:13:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x87, 0x0) 12:13:39 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000040)=0x1000000000004, 0x8, 0x0) 12:13:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x35, 0x0) 12:13:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:13:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x88, 0x0) 12:13:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x45, 0x0) 12:13:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x44, 0x0) 12:13:39 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)) splice(r0, 0x0, r0, &(0x7f0000000200), 0x8, 0x0) 12:13:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x89, 0x0) 12:13:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 12:13:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x36, 0x0) 12:13:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x46, 0x0) 12:13:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x45, 0x0) 12:13:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8a, 0x0) 12:13:39 executing program 0: socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r0, 0xffff, 0x100000000, &(0x7f0000000000)=""/172, &(0x7f00000000c0)=0xac) splice(r0, 0x0, r1, &(0x7f0000000200)=0xfffffffffffffffc, 0x8, 0x0) 12:13:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x37, 0x0) 12:13:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8b, 0x0) [ 2787.461086][T21731] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 12:13:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x47, 0x0) 12:13:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x46, 0x0) 12:13:39 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x8, 0xc8d, 0x10001, 0x1}, {0x5, 0x5, 0x8, 0x4}]}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x11, @remote, 0x4e22, 0x2, 'lc\x00', 0x20, 0xfffffffffffffff9, 0x5a}, {@empty, 0x4e22, 0x10000, 0x2, 0x7ff, 0x9}}, 0x44) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8c, 0x0) 12:13:40 executing program 5: r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) 12:13:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x38, 0x0) 12:13:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x48, 0x0) 12:13:40 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) 12:13:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8d, 0x0) 12:13:40 executing program 0: r0 = socket$inet(0x2, 0x80a, 0x400008) r1 = dup2(r0, r0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000100)=""/121) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r2, 0xa, 0x1f) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000000)=0x16f, 0x4) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x47, 0x0) 12:13:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8e, 0x0) [ 2787.948381][ T26] audit: type=1804 audit(1553170420.223:1660): pid=22377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name=2F02726F75702E73746170 dev="sda1" ino=17473 res=1 12:13:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x0) dup2(r1, r0) 12:13:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x39, 0x0) 12:13:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x49, 0x0) 12:13:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x8f, 0x0) 12:13:40 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r1, 0x0, 0x0, 0x6552, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x48, 0x0) 12:13:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x90, 0x0) 12:13:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3a, 0x0) 12:13:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 12:13:40 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x1000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x2, @rand_addr="45f2a25c3dd1b665864ced75dfe2c7bd", 0x1000}}, 0x10001, 0x4bf7, 0x3, 0xc5, 0x81}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x7, 0x1}, 0xc) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) 12:13:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x91, 0x0) 12:13:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4a, 0x0) 12:13:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x49, 0x0) 12:13:40 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x84) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) shmget(0x0, 0x4000, 0x28, &(0x7f0000ffa000/0x4000)=nil) shmat(0x0, &(0x7f0000ffa000/0x1000)=nil, 0x3000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x297ef) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000200)={'icmp6\x00'}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, 0x0) msgget(0x1, 0x89) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000300)={0x4, 0x8, 0x4b2, 0x7ff, 0x0, 0xb}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000004000), 0x1000) 12:13:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x92, 0x0) 12:13:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3b, 0x0) 12:13:41 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) timerfd_create(0x4, 0x80800) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) splice(r0, 0x0, r1, &(0x7f0000000200), 0x8, 0x0) 12:13:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x93, 0x0) 12:13:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4b, 0x0) 12:13:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4a, 0x0) 12:13:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x94, 0x0) 12:13:41 executing program 0: r0 = socket$inet(0x2, 0x100000000805, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3f4}}, 0x0, 0x6, 0x0, "f14617cf6157bdbe14977f19db17a6669ecfb20c7bec7b8fbc28d37a5ca9bc66de6b906236e2f04537ac7c8a1393cebe4dd4934a899c7fa4ea185ead13ea4c8bab07a6a9369d61ed56c258321a2bf952"}, 0xd8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, &(0x7f0000000200), 0x8, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) 12:13:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 12:13:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4c, 0x0) 12:13:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x95, 0x0) 12:13:41 executing program 5: 12:13:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4b, 0x0) 12:13:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x96, 0x0) 12:13:41 executing program 0: r0 = socket(0xf, 0x80f, 0x1234) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)=0x0) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) r3 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/access\x00', 0x2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) r6 = socket$nl_crypto(0x10, 0x3, 0x15) r7 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000680)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x80800) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/snapshot\x00', 0x800, 0x0) r9 = syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0x5, 0x200002) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000740)='/dev/rtc0\x00', 0x200, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000780)={0x0, 0x0}) getresuid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) r13 = getgid() r14 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/status\x00', 0x0, 0x0) r15 = openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x0, 0x0) r16 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000900)='cgroup.threads\x00', 0x2, 0x0) r17 = syz_open_dev$vcsa(&(0x7f0000000940)='/dev/vcsa#\x00', 0x80000001, 0x82) r18 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/dsp\x00', 0x800, 0x0) r19 = syz_open_dev$dmmidi(&(0x7f00000009c0)='/dev/dmmidi#\x00', 0x81, 0x4081) r20 = syz_open_dev$sndmidi(&(0x7f0000000a00)='/dev/snd/midiC#D#\x00', 0x4d8, 0xe000) sendmsg$unix(r0, &(0x7f0000000b00)={&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000300)="a209db328154348ed52a5765608c205685fc272a16a8845c6bd70bee257c0b9b2d3ff1ab", 0x24}, {&(0x7f0000000400)}], 0x2, &(0x7f0000000a40)=[@cred={0x20, 0x1, 0x2, r1, r2}, @rights={0x30, 0x1, 0x1, [r3, r4, r5, r6, r7, r8, r9, r10]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x28, 0x1, 0x1, [r14, r15, r16, r17, r18]}, @rights={0x18, 0x1, 0x1, [r19, r20]}], 0xb0, 0x48000}, 0x8000) socket$inet(0x2, 0x100000000805, 0x0) r21 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r21, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r4, 0x7439) splice(r0, 0x0, r3, &(0x7f0000000200)=0x80000000000, 0x8, 0x0) 12:13:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3e, 0x0) 12:13:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4e, 0x0) 12:13:42 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getrule={0x20, 0x22, 0x919, 0x70bd2c}, 0x20}}, 0x0) 12:13:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x99, 0x0) 12:13:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4d, 0x0) 12:13:42 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000840)={{0x9, 0x6, 0x3, 0x3f, 0x4f, 0x6}, 0x8, 0x7, 0x5, 0x4, 0x4, "1361b57c54542b409eaefd77b848628d710100000000000000257c351ddf64aa507dd451014040337f8e04921de17701fc140000000000000009fc529975c19b5f6aed9cf688ea0f7778000000000eac79546330798adbca9be5332d47b829dc9317317e84eb5616ea9bc3ac88f2520802c5dda29e792946f1195ac60be0cb77"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000500)={0x0, 0x3a, 0x7f}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r3, 0x300000000000000, 0xa6f9, 0xffffffffffff8000, 0x4, 0x1000}, &(0x7f00000000c0)=0x3f1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180), 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a0800023c390d3188b070") r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) listen(r4, 0x4) accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) accept4$x25(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0xffffffffffffffea) bpf$PROG_LOAD(0x5, 0x0, 0x2cce94e3) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) close(r5) r6 = accept4(r4, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) close(r6) 12:13:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9a, 0x0) 12:13:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4f, 0x0) 12:13:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9b, 0x0) 12:13:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x41, 0x0) 12:13:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4e, 0x0) 12:13:42 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000004740)=[{{&(0x7f00000007c0)=@pptp, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/82, 0x52}, {&(0x7f0000000940)=""/191, 0x7fffefae}], 0x2, &(0x7f0000000ec0)=""/210, 0xd2}}], 0x1, 0x0, &(0x7f0000004840)) 12:13:42 executing program 0: 12:13:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9c, 0x0) 12:13:42 executing program 0: 12:13:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x50, 0x0) 12:13:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x42, 0x0) 12:13:42 executing program 5: 12:13:42 executing program 0: 12:13:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9d, 0x0) 12:13:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4f, 0x0) 12:13:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x51, 0x0) 12:13:42 executing program 5: 12:13:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9e, 0x0) 12:13:43 executing program 0: 12:13:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x43, 0x0) 12:13:43 executing program 5: 12:13:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9f, 0x0) 12:13:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x50, 0x0) 12:13:43 executing program 0: 12:13:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x52, 0x0) 12:13:43 executing program 5: 12:13:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa0, 0x0) 12:13:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x44, 0x0) 12:13:43 executing program 5: 12:13:43 executing program 0: 12:13:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa1, 0x0) 12:13:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x51, 0x0) 12:13:43 executing program 5: 12:13:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x53, 0x0) 12:13:43 executing program 0: 12:13:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa2, 0x0) 12:13:43 executing program 5: 12:13:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x45, 0x0) 12:13:43 executing program 0: 12:13:43 executing program 5: 12:13:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa3, 0x0) 12:13:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x52, 0x0) 12:13:43 executing program 0: 12:13:44 executing program 5: 12:13:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x54, 0x0) 12:13:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa4, 0x0) 12:13:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x46, 0x0) 12:13:44 executing program 0: 12:13:44 executing program 5: 12:13:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x53, 0x0) 12:13:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa5, 0x0) 12:13:44 executing program 0: 12:13:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x55, 0x0) 12:13:44 executing program 5: 12:13:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x47, 0x0) 12:13:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x54, 0x0) 12:13:44 executing program 0: 12:13:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa6, 0x0) 12:13:44 executing program 5: 12:13:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa7, 0x0) 12:13:44 executing program 5: 12:13:44 executing program 0: 12:13:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x56, 0x0) 12:13:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x48, 0x0) 12:13:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x55, 0x0) 12:13:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa8, 0x0) 12:13:44 executing program 5: 12:13:44 executing program 0: 12:13:44 executing program 0: 12:13:45 executing program 5: 12:13:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa9, 0x0) 12:13:45 executing program 0: 12:13:45 executing program 5: 12:13:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x57, 0x0) 12:13:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x49, 0x0) 12:13:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x56, 0x0) 12:13:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xaa, 0x0) 12:13:45 executing program 5: 12:13:45 executing program 0: 12:13:45 executing program 5: 12:13:45 executing program 0: 12:13:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xab, 0x0) 12:13:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x58, 0x0) 12:13:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x57, 0x0) 12:13:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4a, 0x0) 12:13:45 executing program 5: 12:13:45 executing program 0: 12:13:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xac, 0x0) 12:13:45 executing program 5: 12:13:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x59, 0x0) 12:13:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xad, 0x0) 12:13:45 executing program 0: 12:13:45 executing program 5: 12:13:45 executing program 0: 12:13:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x58, 0x0) 12:13:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4b, 0x0) 12:13:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xae, 0x0) 12:13:45 executing program 0: 12:13:46 executing program 5: 12:13:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5a, 0x0) 12:13:46 executing program 5: 12:13:46 executing program 0: 12:13:46 executing program 0: 12:13:46 executing program 5: 12:13:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xaf, 0x0) 12:13:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x59, 0x0) 12:13:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4c, 0x0) 12:13:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5b, 0x0) 12:13:46 executing program 5: 12:13:46 executing program 0: 12:13:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb0, 0x0) 12:13:46 executing program 5: 12:13:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb1, 0x0) 12:13:46 executing program 0: 12:13:46 executing program 5: 12:13:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5a, 0x0) 12:13:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5c, 0x0) 12:13:46 executing program 0: 12:13:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4d, 0x0) 12:13:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb2, 0x0) 12:13:46 executing program 5: 12:13:46 executing program 0: 12:13:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb3, 0x0) 12:13:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5b, 0x0) 12:13:46 executing program 5: 12:13:47 executing program 0: 12:13:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5d, 0x0) 12:13:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb4, 0x0) 12:13:47 executing program 5: 12:13:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4e, 0x0) 12:13:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5c, 0x0) 12:13:47 executing program 0: 12:13:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb5, 0x0) 12:13:47 executing program 5: 12:13:47 executing program 5: 12:13:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb6, 0x0) 12:13:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5e, 0x0) 12:13:47 executing program 0: 12:13:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x4f, 0x0) 12:13:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5d, 0x0) 12:13:47 executing program 5: 12:13:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb7, 0x0) 12:13:47 executing program 5: 12:13:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xa2, 0x0) 12:13:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb8, 0x0) 12:13:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5f, 0x0) 12:13:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x7a, 0x0) 12:13:47 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5e, 0x0) 12:13:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x50, 0x0) 12:13:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xb9, 0x0) [ 2795.604579][T31005] FAULT_INJECTION: forcing a failure. [ 2795.604579][T31005] name failslab, interval 1, probability 0, space 0, times 0 12:13:48 executing program 5 (fault-call:5 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 2795.670921][T31005] CPU: 1 PID: 31005 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2795.678934][T31005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2795.688995][T31005] Call Trace: [ 2795.692327][T31005] dump_stack+0x172/0x1f0 [ 2795.696761][T31005] should_fail.cold+0xa/0x15 [ 2795.701397][T31005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2795.707221][T31005] ? ___might_sleep+0x163/0x280 [ 2795.712098][T31005] __should_failslab+0x121/0x190 [ 2795.712118][T31005] should_failslab+0x9/0x14 [ 2795.712144][T31005] kmem_cache_alloc_node+0x264/0x710 [ 2795.712170][T31005] __alloc_skb+0xd5/0x5e0 [ 2795.712195][T31005] ? skb_trim+0x190/0x190 [ 2795.735534][T31005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2795.741856][T31005] ? netlink_autobind.isra.0+0x228/0x310 [ 2795.747509][T31005] netlink_sendmsg+0x97b/0xd70 [ 2795.752289][T31005] ? netlink_unicast+0x720/0x720 [ 2795.757413][T31005] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2795.762718][T31005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2795.769063][T31005] ? security_socket_sendmsg+0x93/0xc0 [ 2795.769080][T31005] ? netlink_unicast+0x720/0x720 [ 2795.769097][T31005] sock_sendmsg+0xdd/0x130 [ 2795.769115][T31005] ___sys_sendmsg+0x806/0x930 [ 2795.769146][T31005] ? copy_msghdr_from_user+0x430/0x430 [ 2795.784030][T31005] ? kasan_check_read+0x11/0x20 [ 2795.784051][T31005] ? __fget+0x381/0x550 [ 2795.784072][T31005] ? ksys_dup3+0x3e0/0x3e0 [ 2795.807605][T31005] ? lock_downgrade+0x880/0x880 [ 2795.812498][T31005] ? __fget_light+0x1a9/0x230 [ 2795.817187][T31005] ? __fdget+0x1b/0x20 [ 2795.821265][T31005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2795.827517][T31005] __sys_sendmsg+0x105/0x1d0 [ 2795.832120][T31005] ? __ia32_sys_shutdown+0x80/0x80 [ 2795.837263][T31005] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2795.842738][T31005] ? do_syscall_64+0x26/0x610 [ 2795.847420][T31005] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2795.853491][T31005] ? do_syscall_64+0x26/0x610 [ 2795.858191][T31005] __x64_sys_sendmsg+0x78/0xb0 [ 2795.862955][T31005] do_syscall_64+0x103/0x610 [ 2795.867547][T31005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2795.873440][T31005] RIP: 0033:0x458079 [ 2795.877340][T31005] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2795.896935][T31005] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2795.905348][T31005] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2795.913313][T31005] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2795.921305][T31005] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2795.929273][T31005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2795.937340][T31005] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x60, 0x0) 12:13:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x51, 0x0) 12:13:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xba, 0x0) 12:13:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5f, 0x0) 12:13:48 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xbb, 0x0) 12:13:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:13:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x60, 0x0) 12:13:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x61, 0x0) 12:13:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xbc, 0x0) [ 2796.287020][T31736] FAULT_INJECTION: forcing a failure. [ 2796.287020][T31736] name failslab, interval 1, probability 0, space 0, times 0 [ 2796.306412][T31736] CPU: 0 PID: 31736 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2796.314455][T31736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2796.324495][T31736] Call Trace: [ 2796.327788][T31736] dump_stack+0x172/0x1f0 [ 2796.332121][T31736] should_fail.cold+0xa/0x15 [ 2796.336721][T31736] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2796.342513][T31736] ? ___might_sleep+0x163/0x280 [ 2796.347356][T31736] __should_failslab+0x121/0x190 [ 2796.352277][T31736] should_failslab+0x9/0x14 [ 2796.356790][T31736] kmem_cache_alloc_node_trace+0x270/0x720 [ 2796.362585][T31736] __kmalloc_node_track_caller+0x3d/0x70 [ 2796.368201][T31736] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2796.373581][T31736] __alloc_skb+0x10b/0x5e0 [ 2796.378002][T31736] ? skb_trim+0x190/0x190 [ 2796.382317][T31736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2796.388559][T31736] ? netlink_autobind.isra.0+0x228/0x310 [ 2796.394195][T31736] netlink_sendmsg+0x97b/0xd70 [ 2796.398953][T31736] ? netlink_unicast+0x720/0x720 [ 2796.403897][T31736] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2796.409165][T31736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2796.415410][T31736] ? security_socket_sendmsg+0x93/0xc0 [ 2796.420852][T31736] ? netlink_unicast+0x720/0x720 [ 2796.425772][T31736] sock_sendmsg+0xdd/0x130 [ 2796.430189][T31736] ___sys_sendmsg+0x806/0x930 [ 2796.434857][T31736] ? copy_msghdr_from_user+0x430/0x430 [ 2796.440300][T31736] ? kasan_check_read+0x11/0x20 [ 2796.445144][T31736] ? __fget+0x381/0x550 [ 2796.449308][T31736] ? ksys_dup3+0x3e0/0x3e0 [ 2796.453730][T31736] ? lock_downgrade+0x880/0x880 [ 2796.458567][T31736] ? __fget_light+0x1a9/0x230 [ 2796.463314][T31736] ? __fdget+0x1b/0x20 [ 2796.467387][T31736] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2796.473636][T31736] __sys_sendmsg+0x105/0x1d0 [ 2796.478241][T31736] ? __ia32_sys_shutdown+0x80/0x80 [ 2796.483430][T31736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2796.488892][T31736] ? do_syscall_64+0x26/0x610 [ 2796.493573][T31736] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2796.499636][T31736] ? do_syscall_64+0x26/0x610 [ 2796.504304][T31736] __x64_sys_sendmsg+0x78/0xb0 [ 2796.509053][T31736] do_syscall_64+0x103/0x610 [ 2796.513653][T31736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2796.519634][T31736] RIP: 0033:0x458079 [ 2796.524849][T31736] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2796.544523][T31736] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2796.552931][T31736] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2796.560903][T31736] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2796.568867][T31736] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2796.576819][T31736] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 12:13:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x52, 0x0) [ 2796.584770][T31736] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:48 executing program 0 (fault-call:1 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xbd, 0x0) [ 2796.790363][T31872] FAULT_INJECTION: forcing a failure. [ 2796.790363][T31872] name failslab, interval 1, probability 0, space 0, times 0 [ 2796.847625][T31872] CPU: 1 PID: 31872 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2796.855813][T31872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2796.865871][T31872] Call Trace: [ 2796.869186][T31872] dump_stack+0x172/0x1f0 [ 2796.873536][T31872] should_fail.cold+0xa/0x15 [ 2796.878145][T31872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2796.884058][T31872] ? ___might_sleep+0x163/0x280 [ 2796.888914][T31872] __should_failslab+0x121/0x190 12:13:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x61, 0x0) 12:13:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000000)='./file1\x00', 0x20400040c2, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x48000000000000, 0x402) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') [ 2796.893860][T31872] should_failslab+0x9/0x14 [ 2796.898379][T31872] kmem_cache_alloc_trace+0x2d1/0x760 [ 2796.903840][T31872] rtnl_newlink+0x4b/0xa0 [ 2796.908183][T31872] ? __rtnl_newlink+0x16c0/0x16c0 [ 2796.913218][T31872] rtnetlink_rcv_msg+0x465/0xb00 [ 2796.918174][T31872] ? rtnetlink_put_metrics+0x560/0x560 [ 2796.923692][T31872] ? netlink_deliver_tap+0x22d/0xc00 [ 2796.929048][T31872] ? find_held_lock+0x35/0x130 [ 2796.933823][T31872] netlink_rcv_skb+0x17a/0x460 [ 2796.938596][T31872] ? rtnetlink_put_metrics+0x560/0x560 [ 2796.944239][T31872] ? netlink_ack+0xb50/0xb50 [ 2796.948829][T31872] ? kasan_check_read+0x11/0x20 [ 2796.953728][T31872] ? netlink_deliver_tap+0x254/0xc00 [ 2796.958998][T31872] rtnetlink_rcv+0x1d/0x30 [ 2796.963396][T31872] netlink_unicast+0x536/0x720 [ 2796.968172][T31872] ? netlink_attachskb+0x770/0x770 [ 2796.973278][T31872] ? _copy_from_iter_full+0x259/0x8f0 [ 2796.978649][T31872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2796.984873][T31872] netlink_sendmsg+0x8ae/0xd70 [ 2796.989618][T31872] ? netlink_unicast+0x720/0x720 [ 2796.994538][T31872] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2796.999821][T31872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2797.006051][T31872] ? security_socket_sendmsg+0x93/0xc0 [ 2797.011495][T31872] ? netlink_unicast+0x720/0x720 [ 2797.016418][T31872] sock_sendmsg+0xdd/0x130 [ 2797.020819][T31872] ___sys_sendmsg+0x806/0x930 [ 2797.025476][T31872] ? copy_msghdr_from_user+0x430/0x430 [ 2797.030919][T31872] ? kasan_check_read+0x11/0x20 [ 2797.035766][T31872] ? __fget+0x381/0x550 [ 2797.039997][T31872] ? ksys_dup3+0x3e0/0x3e0 [ 2797.044420][T31872] ? lock_downgrade+0x880/0x880 [ 2797.049255][T31872] ? __fget_light+0x1a9/0x230 [ 2797.053916][T31872] ? __fdget+0x1b/0x20 [ 2797.057965][T31872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2797.064193][T31872] __sys_sendmsg+0x105/0x1d0 [ 2797.068869][T31872] ? __ia32_sys_shutdown+0x80/0x80 [ 2797.073999][T31872] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2797.079455][T31872] ? do_syscall_64+0x26/0x610 [ 2797.084110][T31872] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2797.090183][T31872] ? do_syscall_64+0x26/0x610 [ 2797.094853][T31872] __x64_sys_sendmsg+0x78/0xb0 [ 2797.099613][T31872] do_syscall_64+0x103/0x610 [ 2797.104388][T31872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2797.110268][T31872] RIP: 0033:0x458079 [ 2797.114163][T31872] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2797.133755][T31872] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 12:13:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x62, 0x0) 12:13:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xbe, 0x0) 12:13:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x53, 0x0) [ 2797.142148][T31872] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2797.150187][T31872] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2797.158172][T31872] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2797.166494][T31872] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2797.174467][T31872] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:49 executing program 0 (fault-call:1 fault-nth:3): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xbf, 0x0) [ 2797.362571][ T26] audit: type=1800 audit(1553170429.643:1661): pid=32183 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file1" dev="loop5" ino=299 res=0 12:13:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$P9_RUNLINKAT(r0, &(0x7f00000001c0)={0x7, 0x4d, 0x2}, 0x7) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x1) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x18) open$dir(&(0x7f0000000380)='./file0\x00', 0x200, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x7, &(0x7f0000001880)=[{&(0x7f00000003c0)="df6c7fff2941988d42cf85f58996c8ca76152729b0b37195c303305a6d307dc2d3d61f08bad1121bf2800069ed90b8f3af18f540f1208fac1f4d35f2cad18391caaa5158dd2063755637f4119d66f1d1e47d8432f54d1847283f21a5e76ec53e90ca4e80ff56aaa6f4d77c5268fa1a5c8939b6964caeee1cab2ef8f323ed17ac628b65ff9be4f7baa3c3c787b4ec40cafe0f51c43a7908f2e1c3fee73dd79ad700eab56c9e3b20260b61050e84d030f5a95869f48f59a8784e42b9137f888d63a574d22d6bce957b4107ce445c01e84046df6ec84d97d30c235e", 0xda, 0x8}, {&(0x7f0000000580)="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", 0x1000, 0x100000001}, {&(0x7f0000001580)="06baf524b99d4a69680fefb5e9563c4616601add4ccc71330680127ce54a537ba46bbc12de925b175937b2301777c7271ca2ba7f5ccf5ff0b5cb5e670e369cca42248bd92680e9172a209c2643090d3f38fc1b38bdf7615779eba83b6ff618868d8b7f6630fff75dd9036f7022be58692fca42dbe30b8996e9c59c87966528771e19e9482d8214f921cc59146f342a799f09af7ced869baeb5f1da317dedba14ae3d6b2733c8de804e3ff2d58535", 0xae, 0x5df9}, {&(0x7f0000000100)="45d958c50122428e8a2f1c8a42aaa3e6938bbf70b2dadc416fd174bc34d88f1dc97b2fa413b7518ba18cc81c3792fdd86efcd22d79c928be1a2bc809", 0x3c, 0x401}, {&(0x7f0000001640)="f7f2a3c726852e2c9e8852b287b100aba68dbc9406b1b7a6ec0a19aa6b79051e9b52798f1191948b3419bd8a4552cd6f04ad550d9a44344fbb33ada0214f9a1c1aaf4ed833a7f7a6e154ea0b822ecd038cf4b77914c8907c1c0bfedd7188900006445c5b77cfcfacdbae535255ceb610c2299650b0cd2510c7c1f1445ac4543a2ad8cfb809ed83", 0x87, 0x100}, {&(0x7f0000001700)="8b6dd177c8573c8e4a23f9899d606a48527c3ccec8fc1ad87ac8462be65c746fe40c151e15c9b97ef145b2d10b94804b01bfe8e3540d91bcd1dcb3f96bdd8247f471c071222dd9ec533721eae3f730da4273f7c921bba39bdaf59241d7cf342e44eb2da785d3c4781999f296e377dd834655cdf827a8edf9e890db358989ec3d0fdac4634a297a903f3e7ff2ee268120a9f40aff8e229df95fef45d47655", 0x9e, 0x1c00000000}, {&(0x7f00000017c0)="e40c694fd1d7e68d41a523509283a6bbd7225349c51ce252dc443b2ec879af514785a932f4cde9811eb193afad9ece65dae6851bee925bdfcd471da57738c49c40dfe22e66ce3b180a8b679453638f5f802721f8a374723b1c61477a8a3865bde3a971b9bc6fa0aea669cd915d51eed726a6754496b0e06978878a79570686f37b2ff3b4ee6756538cf67198958545", 0x8f, 0x7f}], 0x80, 0x0) [ 2797.453112][T32435] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 12:13:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x62, 0x0) [ 2797.497724][T32435] FAULT_INJECTION: forcing a failure. [ 2797.497724][T32435] name failslab, interval 1, probability 0, space 0, times 0 [ 2797.528107][T32435] CPU: 1 PID: 32435 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2797.536164][T32435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:13:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc0, 0x0) [ 2797.546227][T32435] Call Trace: [ 2797.549531][T32435] dump_stack+0x172/0x1f0 [ 2797.553870][T32435] should_fail.cold+0xa/0x15 [ 2797.558583][T32435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2797.564404][T32435] ? ___might_sleep+0x163/0x280 [ 2797.569256][T32435] __should_failslab+0x121/0x190 [ 2797.574203][T32435] should_failslab+0x9/0x14 [ 2797.578696][T32435] kmem_cache_alloc_node_trace+0x270/0x720 [ 2797.584530][T32435] __kmalloc_node+0x3d/0x70 [ 2797.589037][T32435] kvmalloc_node+0xbd/0x100 [ 2797.593552][T32435] alloc_netdev_mqs+0x98/0xd30 [ 2797.598330][T32435] ? ns_capable+0x20/0x30 [ 2797.602883][T32435] ? __bond_opt_init+0xb0/0xb0 [ 2797.607636][T32435] rtnl_create_link+0x22d/0xac0 [ 2797.612491][T32435] __rtnl_newlink+0xf7b/0x16c0 [ 2797.617266][T32435] ? rtnl_link_unregister+0x250/0x250 [ 2797.622620][T32435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2797.628869][T32435] ? is_bpf_text_address+0xd3/0x170 [ 2797.634051][T32435] ? kernel_text_address+0x73/0xf0 [ 2797.639149][T32435] ? __kernel_text_address+0xd/0x40 [ 2797.644337][T32435] ? unwind_get_return_address+0x61/0xa0 [ 2797.649996][T32435] ? __save_stack_trace+0x99/0x100 [ 2797.655120][T32435] ? save_stack+0xa9/0xd0 [ 2797.659457][T32435] ? save_stack+0x45/0xd0 [ 2797.663780][T32435] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2797.669571][T32435] ? kasan_kmalloc+0x9/0x10 [ 2797.674054][T32435] ? kmem_cache_alloc_trace+0x151/0x760 [ 2797.679582][T32435] ? rtnl_newlink+0x4b/0xa0 [ 2797.684081][T32435] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2797.689229][T32435] rtnl_newlink+0x69/0xa0 [ 2797.693555][T32435] ? __rtnl_newlink+0x16c0/0x16c0 [ 2797.698581][T32435] rtnetlink_rcv_msg+0x465/0xb00 [ 2797.703520][T32435] ? rtnetlink_put_metrics+0x560/0x560 [ 2797.708983][T32435] ? netlink_deliver_tap+0x22d/0xc00 [ 2797.714252][T32435] ? find_held_lock+0x35/0x130 [ 2797.719003][T32435] netlink_rcv_skb+0x17a/0x460 [ 2797.723753][T32435] ? rtnetlink_put_metrics+0x560/0x560 [ 2797.729207][T32435] ? netlink_ack+0xb50/0xb50 [ 2797.733792][T32435] ? kasan_check_read+0x11/0x20 [ 2797.738629][T32435] ? netlink_deliver_tap+0x254/0xc00 [ 2797.743917][T32435] rtnetlink_rcv+0x1d/0x30 [ 2797.748319][T32435] netlink_unicast+0x536/0x720 [ 2797.753098][T32435] ? netlink_attachskb+0x770/0x770 [ 2797.758201][T32435] ? _copy_from_iter_full+0x259/0x8f0 [ 2797.763575][T32435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2797.769814][T32435] netlink_sendmsg+0x8ae/0xd70 [ 2797.774580][T32435] ? netlink_unicast+0x720/0x720 [ 2797.779523][T32435] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2797.784794][T32435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2797.791027][T32435] ? security_socket_sendmsg+0x93/0xc0 [ 2797.796473][T32435] ? netlink_unicast+0x720/0x720 [ 2797.801395][T32435] sock_sendmsg+0xdd/0x130 [ 2797.805794][T32435] ___sys_sendmsg+0x806/0x930 [ 2797.810455][T32435] ? copy_msghdr_from_user+0x430/0x430 [ 2797.815918][T32435] ? kasan_check_read+0x11/0x20 [ 2797.820756][T32435] ? __fget+0x381/0x550 [ 2797.824895][T32435] ? ksys_dup3+0x3e0/0x3e0 [ 2797.829293][T32435] ? lock_downgrade+0x880/0x880 [ 2797.834137][T32435] ? __fget_light+0x1a9/0x230 [ 2797.838794][T32435] ? __fdget+0x1b/0x20 [ 2797.842863][T32435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2797.849096][T32435] __sys_sendmsg+0x105/0x1d0 [ 2797.853671][T32435] ? __ia32_sys_shutdown+0x80/0x80 [ 2797.858771][T32435] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2797.864212][T32435] ? do_syscall_64+0x26/0x610 [ 2797.868872][T32435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2797.874918][T32435] ? do_syscall_64+0x26/0x610 [ 2797.879599][T32435] __x64_sys_sendmsg+0x78/0xb0 [ 2797.884354][T32435] do_syscall_64+0x103/0x610 [ 2797.888957][T32435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2797.894829][T32435] RIP: 0033:0x458079 [ 2797.898719][T32435] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2797.918326][T32435] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2797.926734][T32435] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2797.934700][T32435] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 12:13:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x54, 0x0) 12:13:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x63, 0x0) [ 2797.942681][T32435] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2797.950639][T32435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2797.958600][T32435] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:50 executing program 0 (fault-call:1 fault-nth:4): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc1, 0x0) [ 2798.178367][T32751] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 12:13:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x63, 0x0) [ 2798.224612][T32751] FAULT_INJECTION: forcing a failure. [ 2798.224612][T32751] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.280972][T32751] CPU: 0 PID: 32751 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2798.289076][T32751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2798.299143][T32751] Call Trace: [ 2798.302453][T32751] dump_stack+0x172/0x1f0 [ 2798.306799][T32751] should_fail.cold+0xa/0x15 [ 2798.311404][T32751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2798.317233][T32751] __should_failslab+0x121/0x190 [ 2798.322182][T32751] should_failslab+0x9/0x14 12:13:50 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x12000, 0x84) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0xffffff7e, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000000)=""/41) 12:13:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x55, 0x0) 12:13:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x64, 0x0) [ 2798.326697][T32751] kmem_cache_alloc_trace+0x4b/0x760 [ 2798.332000][T32751] __hw_addr_create_ex+0x5e/0x310 [ 2798.337033][T32751] __hw_addr_add_ex+0x1ef/0x2b0 [ 2798.342368][T32751] dev_addr_init+0x118/0x200 [ 2798.346964][T32751] ? dev_mc_flush+0x40/0x40 [ 2798.351505][T32751] ? __kmalloc_node+0x4e/0x70 [ 2798.356197][T32751] alloc_netdev_mqs+0x142/0xd30 [ 2798.361066][T32751] ? ns_capable+0x20/0x30 [ 2798.365400][T32751] ? __bond_opt_init+0xb0/0xb0 [ 2798.370175][T32751] rtnl_create_link+0x22d/0xac0 [ 2798.375044][T32751] __rtnl_newlink+0xf7b/0x16c0 [ 2798.379828][T32751] ? rtnl_link_unregister+0x250/0x250 [ 2798.385218][T32751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2798.391477][T32751] ? is_bpf_text_address+0xd3/0x170 [ 2798.396681][T32751] ? kernel_text_address+0x73/0xf0 [ 2798.401972][T32751] ? __kernel_text_address+0xd/0x40 [ 2798.407179][T32751] ? unwind_get_return_address+0x61/0xa0 [ 2798.412826][T32751] ? __save_stack_trace+0x99/0x100 [ 2798.417984][T32751] ? save_stack+0xa9/0xd0 [ 2798.422323][T32751] ? save_stack+0x45/0xd0 12:13:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x64, 0x0) [ 2798.426661][T32751] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2798.432507][T32751] ? kasan_kmalloc+0x9/0x10 [ 2798.437018][T32751] ? kmem_cache_alloc_trace+0x151/0x760 [ 2798.442574][T32751] ? rtnl_newlink+0x4b/0xa0 [ 2798.447117][T32751] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2798.452312][T32751] rtnl_newlink+0x69/0xa0 [ 2798.456673][T32751] ? __rtnl_newlink+0x16c0/0x16c0 [ 2798.461704][T32751] rtnetlink_rcv_msg+0x465/0xb00 [ 2798.466660][T32751] ? rtnetlink_put_metrics+0x560/0x560 [ 2798.472160][T32751] ? netlink_deliver_tap+0x22d/0xc00 [ 2798.477449][T32751] ? find_held_lock+0x35/0x130 [ 2798.482214][T32751] netlink_rcv_skb+0x17a/0x460 [ 2798.486966][T32751] ? rtnetlink_put_metrics+0x560/0x560 [ 2798.492420][T32751] ? netlink_ack+0xb50/0xb50 [ 2798.497017][T32751] ? kasan_check_read+0x11/0x20 [ 2798.501865][T32751] ? netlink_deliver_tap+0x254/0xc00 [ 2798.507142][T32751] rtnetlink_rcv+0x1d/0x30 [ 2798.511549][T32751] netlink_unicast+0x536/0x720 [ 2798.516353][T32751] ? netlink_attachskb+0x770/0x770 [ 2798.521496][T32751] ? _copy_from_iter_full+0x259/0x8f0 [ 2798.526854][T32751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2798.533090][T32751] netlink_sendmsg+0x8ae/0xd70 [ 2798.537952][T32751] ? netlink_unicast+0x720/0x720 [ 2798.542876][T32751] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2798.548150][T32751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2798.554470][T32751] ? security_socket_sendmsg+0x93/0xc0 [ 2798.559921][T32751] ? netlink_unicast+0x720/0x720 [ 2798.564872][T32751] sock_sendmsg+0xdd/0x130 [ 2798.569283][T32751] ___sys_sendmsg+0x806/0x930 [ 2798.573968][T32751] ? copy_msghdr_from_user+0x430/0x430 [ 2798.579425][T32751] ? kasan_check_read+0x11/0x20 [ 2798.584285][T32751] ? __fget+0x381/0x550 [ 2798.588425][T32751] ? ksys_dup3+0x3e0/0x3e0 [ 2798.592831][T32751] ? lock_downgrade+0x880/0x880 [ 2798.597703][T32751] ? __fget_light+0x1a9/0x230 [ 2798.602386][T32751] ? __fdget+0x1b/0x20 [ 2798.606437][T32751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2798.612674][T32751] __sys_sendmsg+0x105/0x1d0 [ 2798.617266][T32751] ? __ia32_sys_shutdown+0x80/0x80 [ 2798.622367][T32751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2798.627836][T32751] ? do_syscall_64+0x26/0x610 [ 2798.632505][T32751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2798.638564][T32751] ? do_syscall_64+0x26/0x610 [ 2798.643255][T32751] __x64_sys_sendmsg+0x78/0xb0 [ 2798.648007][T32751] do_syscall_64+0x103/0x610 [ 2798.652689][T32751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2798.658572][T32751] RIP: 0033:0x458079 [ 2798.662729][T32751] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:13:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc2, 0x0) 12:13:51 executing program 0 (fault-call:1 fault-nth:5): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) [ 2798.682347][T32751] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2798.690750][T32751] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2798.698732][T32751] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2798.706686][T32751] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2798.714641][T32751] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2798.722594][T32751] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 [ 2798.765459][ T651] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 2798.773886][ T651] FAULT_INJECTION: forcing a failure. [ 2798.773886][ T651] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.787401][ T651] CPU: 0 PID: 651 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2798.795220][ T651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2798.795228][ T651] Call Trace: [ 2798.795255][ T651] dump_stack+0x172/0x1f0 [ 2798.795280][ T651] should_fail.cold+0xa/0x15 [ 2798.817541][ T651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2798.823369][ T651] ? ___might_sleep+0x163/0x280 [ 2798.828243][ T651] __should_failslab+0x121/0x190 [ 2798.833196][ T651] should_failslab+0x9/0x14 [ 2798.837715][ T651] kmem_cache_alloc_node_trace+0x270/0x720 [ 2798.843527][ T651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2798.843546][ T651] ? dev_addr_init+0x17f/0x200 [ 2798.843567][ T651] __kmalloc_node+0x3d/0x70 [ 2798.843587][ T651] kvmalloc_node+0xbd/0x100 [ 2798.843607][ T651] alloc_netdev_mqs+0x67f/0xd30 [ 2798.843628][ T651] ? __bond_opt_init+0xb0/0xb0 [ 2798.873446][ T651] rtnl_create_link+0x22d/0xac0 [ 2798.878324][ T651] __rtnl_newlink+0xf7b/0x16c0 [ 2798.883109][ T651] ? rtnl_link_unregister+0x250/0x250 [ 2798.888495][ T651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2798.888524][ T651] ? is_bpf_text_address+0xd3/0x170 [ 2798.888540][ T651] ? kernel_text_address+0x73/0xf0 [ 2798.888554][ T651] ? __kernel_text_address+0xd/0x40 [ 2798.888572][ T651] ? unwind_get_return_address+0x61/0xa0 [ 2798.888592][ T651] ? __save_stack_trace+0x99/0x100 [ 2798.921085][ T651] ? save_stack+0xa9/0xd0 [ 2798.925422][ T651] ? save_stack+0x45/0xd0 [ 2798.929761][ T651] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2798.935569][ T651] ? kasan_kmalloc+0x9/0x10 [ 2798.935586][ T651] ? kmem_cache_alloc_trace+0x151/0x760 [ 2798.935602][ T651] ? rtnl_newlink+0x4b/0xa0 [ 2798.935616][ T651] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2798.935687][ T651] rtnl_newlink+0x69/0xa0 [ 2798.959825][ T651] ? __rtnl_newlink+0x16c0/0x16c0 [ 2798.964888][ T651] rtnetlink_rcv_msg+0x465/0xb00 [ 2798.969856][ T651] ? rtnetlink_put_metrics+0x560/0x560 [ 2798.969881][ T651] ? netlink_deliver_tap+0x22d/0xc00 [ 2798.969898][ T651] ? find_held_lock+0x35/0x130 [ 2798.969918][ T651] netlink_rcv_skb+0x17a/0x460 [ 2798.969935][ T651] ? rtnetlink_put_metrics+0x560/0x560 [ 2798.969951][ T651] ? netlink_ack+0xb50/0xb50 [ 2798.969969][ T651] ? kasan_check_read+0x11/0x20 [ 2798.969989][ T651] ? netlink_deliver_tap+0x254/0xc00 [ 2798.970010][ T651] rtnetlink_rcv+0x1d/0x30 [ 2798.970023][ T651] netlink_unicast+0x536/0x720 [ 2798.970041][ T651] ? netlink_attachskb+0x770/0x770 [ 2798.970056][ T651] ? _copy_from_iter_full+0x259/0x8f0 [ 2798.970075][ T651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2798.970095][ T651] netlink_sendmsg+0x8ae/0xd70 [ 2798.985605][ T651] ? netlink_unicast+0x720/0x720 [ 2798.985627][ T651] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2798.985643][ T651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2798.985657][ T651] ? security_socket_sendmsg+0x93/0xc0 12:13:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc3, 0x0) [ 2798.985671][ T651] ? netlink_unicast+0x720/0x720 [ 2798.985689][ T651] sock_sendmsg+0xdd/0x130 [ 2798.985706][ T651] ___sys_sendmsg+0x806/0x930 [ 2798.985732][ T651] ? copy_msghdr_from_user+0x430/0x430 [ 2799.030220][ T651] ? kasan_check_read+0x11/0x20 [ 2799.030243][ T651] ? __fget+0x381/0x550 [ 2799.030266][ T651] ? ksys_dup3+0x3e0/0x3e0 [ 2799.030280][ T651] ? lock_downgrade+0x880/0x880 [ 2799.030303][ T651] ? __fget_light+0x1a9/0x230 [ 2799.030319][ T651] ? __fdget+0x1b/0x20 [ 2799.030334][ T651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2799.030356][ T651] __sys_sendmsg+0x105/0x1d0 [ 2799.030374][ T651] ? __ia32_sys_shutdown+0x80/0x80 [ 2799.030402][ T651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2799.030417][ T651] ? do_syscall_64+0x26/0x610 [ 2799.030441][ T651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2799.051629][ T651] ? do_syscall_64+0x26/0x610 [ 2799.051655][ T651] __x64_sys_sendmsg+0x78/0xb0 [ 2799.051673][ T651] do_syscall_64+0x103/0x610 [ 2799.051693][ T651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2799.051705][ T651] RIP: 0033:0x458079 [ 2799.051719][ T651] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2799.051727][ T651] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2799.051741][ T651] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2799.051750][ T651] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 12:13:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x65, 0x0) 12:13:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x56, 0x0) [ 2799.051758][ T651] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2799.051767][ T651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2799.051775][ T651] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc4, 0x0) 12:13:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x65, 0x0) 12:13:51 executing program 0 (fault-call:1 fault-nth:6): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$kcm(0x29, 0x2, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) getpeername$unix(r1, &(0x7f0000000000), &(0x7f0000000080)=0x6e) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:13:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc5, 0x0) [ 2799.509548][ T1226] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 12:13:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x66, 0x0) 12:13:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x57, 0x0) [ 2799.575337][ T1226] FAULT_INJECTION: forcing a failure. [ 2799.575337][ T1226] name failslab, interval 1, probability 0, space 0, times 0 [ 2799.657086][ T1226] CPU: 0 PID: 1226 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2799.665031][ T1226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2799.670058][ T26] audit: type=1800 audit(1553170431.953:1662): pid=1386 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=300 res=0 [ 2799.675092][ T1226] Call Trace: [ 2799.675123][ T1226] dump_stack+0x172/0x1f0 12:13:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x66, 0x0) 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc6, 0x0) [ 2799.675158][ T1226] should_fail.cold+0xa/0x15 [ 2799.675182][ T1226] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2799.675205][ T1226] ? ___might_sleep+0x163/0x280 [ 2799.675234][ T1226] __should_failslab+0x121/0x190 [ 2799.726213][ T1226] should_failslab+0x9/0x14 [ 2799.730727][ T1226] kmem_cache_alloc_node_trace+0x270/0x720 [ 2799.736542][ T1226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2799.742791][ T1226] ? dev_addr_init+0x17f/0x200 [ 2799.742813][ T1226] __kmalloc_node+0x3d/0x70 [ 2799.742832][ T1226] kvmalloc_node+0xbd/0x100 [ 2799.742852][ T1226] alloc_netdev_mqs+0x67f/0xd30 [ 2799.742871][ T1226] ? __bond_opt_init+0xb0/0xb0 [ 2799.742890][ T1226] rtnl_create_link+0x22d/0xac0 [ 2799.742911][ T1226] __rtnl_newlink+0xf7b/0x16c0 [ 2799.756668][ T1226] ? rtnl_link_unregister+0x250/0x250 [ 2799.756686][ T1226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2799.756712][ T1226] ? is_bpf_text_address+0xd3/0x170 [ 2799.756728][ T1226] ? kernel_text_address+0x73/0xf0 [ 2799.756743][ T1226] ? __kernel_text_address+0xd/0x40 12:13:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0xc00, 0x10) fchdir(r0) open(&(0x7f0000000400)='./file1\x00', 0x20400040c2, 0x100) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="b00000000000000007000000000000000100000000000000000000000000000009ffffffffffffff299c000000000000000000000600000005000000000000000004000000000000ff0000000000000008000000000000000000000000000000c60000000000000009000000ffffffff40000000ee01000003000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="001000001e000000000000000600000000000000010000000000000005000000b1a9a64ada6cb67f00000000"], 0xb0) open$dir(&(0x7f0000000000)='./file0\x00', 0x4103, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x2, 0xfffffffffffff928) write(0xffffffffffffffff, 0x0, 0x0) [ 2799.756765][ T1226] ? unwind_get_return_address+0x61/0xa0 [ 2799.808694][ T1226] ? __save_stack_trace+0x99/0x100 [ 2799.813828][ T1226] ? save_stack+0xa9/0xd0 [ 2799.818256][ T1226] ? save_stack+0x45/0xd0 [ 2799.822594][ T1226] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2799.828412][ T1226] ? kasan_kmalloc+0x9/0x10 [ 2799.832919][ T1226] ? kmem_cache_alloc_trace+0x151/0x760 [ 2799.838474][ T1226] ? rtnl_newlink+0x4b/0xa0 [ 2799.842978][ T1226] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2799.848172][ T1226] rtnl_newlink+0x69/0xa0 [ 2799.852516][ T1226] ? __rtnl_newlink+0x16c0/0x16c0 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x2) [ 2799.857547][ T1226] rtnetlink_rcv_msg+0x465/0xb00 [ 2799.862494][ T1226] ? rtnetlink_put_metrics+0x560/0x560 [ 2799.867964][ T1226] ? netlink_deliver_tap+0x22d/0xc00 [ 2799.873258][ T1226] ? find_held_lock+0x35/0x130 [ 2799.878032][ T1226] netlink_rcv_skb+0x17a/0x460 [ 2799.882802][ T1226] ? rtnetlink_put_metrics+0x560/0x560 [ 2799.888273][ T1226] ? netlink_ack+0xb50/0xb50 [ 2799.892874][ T1226] ? kasan_check_read+0x11/0x20 [ 2799.897735][ T1226] ? netlink_deliver_tap+0x254/0xc00 [ 2799.903033][ T1226] rtnetlink_rcv+0x1d/0x30 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x3) [ 2799.907458][ T1226] netlink_unicast+0x536/0x720 [ 2799.912242][ T1226] ? netlink_attachskb+0x770/0x770 [ 2799.917369][ T1226] ? _copy_from_iter_full+0x259/0x8f0 [ 2799.922757][ T1226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2799.929011][ T1226] netlink_sendmsg+0x8ae/0xd70 [ 2799.933793][ T1226] ? netlink_unicast+0x720/0x720 [ 2799.938744][ T1226] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2799.944040][ T1226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2799.950300][ T1226] ? security_socket_sendmsg+0x93/0xc0 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x4) [ 2799.955767][ T1226] ? netlink_unicast+0x720/0x720 [ 2799.960719][ T1226] sock_sendmsg+0xdd/0x130 [ 2799.965156][ T1226] ___sys_sendmsg+0x806/0x930 [ 2799.969843][ T1226] ? copy_msghdr_from_user+0x430/0x430 [ 2799.975321][ T1226] ? kasan_check_read+0x11/0x20 [ 2799.980186][ T1226] ? __fget+0x381/0x550 [ 2799.984355][ T1226] ? ksys_dup3+0x3e0/0x3e0 [ 2799.988774][ T1226] ? lock_downgrade+0x880/0x880 [ 2799.993647][ T1226] ? __fget_light+0x1a9/0x230 [ 2799.998336][ T1226] ? __fdget+0x1b/0x20 [ 2800.002415][ T1226] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x5) [ 2800.008680][ T1226] __sys_sendmsg+0x105/0x1d0 [ 2800.013289][ T1226] ? __ia32_sys_shutdown+0x80/0x80 [ 2800.018425][ T1226] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2800.023900][ T1226] ? do_syscall_64+0x26/0x610 [ 2800.028587][ T1226] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2800.034660][ T1226] ? do_syscall_64+0x26/0x610 [ 2800.039444][ T1226] __x64_sys_sendmsg+0x78/0xb0 [ 2800.044228][ T1226] do_syscall_64+0x103/0x610 [ 2800.048837][ T1226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2800.054739][ T1226] RIP: 0033:0x458079 [ 2800.058639][ T1226] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2800.078254][ T1226] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2800.078270][ T1226] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2800.078278][ T1226] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2800.078285][ T1226] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2800.078292][ T1226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2800.078299][ T1226] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:52 executing program 0 (fault-call:1 fault-nth:7): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x67, 0x0) 12:13:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x58, 0x0) 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x6) 12:13:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x67, 0x0) [ 2800.336669][ T26] audit: type=1800 audit(1553170432.613:1663): pid=1783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file1" dev="loop5" ino=301 res=0 [ 2800.417483][ T1874] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 2800.478256][ T1874] FAULT_INJECTION: forcing a failure. [ 2800.478256][ T1874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2800.491493][ T1874] CPU: 0 PID: 1874 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2800.499387][ T1874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2800.509452][ T1874] Call Trace: [ 2800.512763][ T1874] dump_stack+0x172/0x1f0 [ 2800.517106][ T1874] should_fail.cold+0xa/0x15 [ 2800.521724][ T1874] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:13:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') accept4(r0, &(0x7f0000000040)=@rc, &(0x7f0000000100)=0x80, 0x800) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x7) [ 2800.527540][ T1874] ? __lock_acquire+0x548/0x3fb0 [ 2800.527557][ T1874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2800.527571][ T1874] ? should_fail+0x1de/0x852 [ 2800.527596][ T1874] should_fail_alloc_page+0x50/0x60 [ 2800.538754][ T1874] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2800.538783][ T1874] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2800.559616][ T1874] ? find_held_lock+0x35/0x130 [ 2800.564408][ T1874] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2800.570241][ T1874] cache_grow_begin+0x9c/0x860 [ 2800.575018][ T1874] ? __kmalloc_node+0x3d/0x70 [ 2800.579706][ T1874] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2800.585956][ T1874] kmem_cache_alloc_node_trace+0x658/0x720 [ 2800.591774][ T1874] __kmalloc_node+0x3d/0x70 [ 2800.596290][ T1874] kvmalloc_node+0xbd/0x100 [ 2800.601328][ T1874] alloc_netdev_mqs+0x67f/0xd30 [ 2800.606188][ T1874] ? __bond_opt_init+0xb0/0xb0 [ 2800.610964][ T1874] rtnl_create_link+0x22d/0xac0 [ 2800.615862][ T1874] __rtnl_newlink+0xf7b/0x16c0 [ 2800.620653][ T1874] ? rtnl_link_unregister+0x250/0x250 [ 2800.626035][ T1874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2800.632296][ T1874] ? is_bpf_text_address+0xd3/0x170 [ 2800.637501][ T1874] ? kernel_text_address+0x73/0xf0 [ 2800.642617][ T1874] ? __kernel_text_address+0xd/0x40 [ 2800.647819][ T1874] ? unwind_get_return_address+0x61/0xa0 [ 2800.653450][ T1874] ? __save_stack_trace+0x99/0x100 [ 2800.658586][ T1874] ? save_stack+0xa9/0xd0 [ 2800.662928][ T1874] ? save_stack+0x45/0xd0 [ 2800.667268][ T1874] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2800.673079][ T1874] ? kasan_kmalloc+0x9/0x10 12:13:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x8) 12:13:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xa) [ 2800.677602][ T1874] ? kmem_cache_alloc_trace+0x151/0x760 [ 2800.683159][ T1874] ? rtnl_newlink+0x4b/0xa0 [ 2800.687669][ T1874] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2800.692850][ T1874] rtnl_newlink+0x69/0xa0 [ 2800.697193][ T1874] ? __rtnl_newlink+0x16c0/0x16c0 [ 2800.702244][ T1874] rtnetlink_rcv_msg+0x465/0xb00 [ 2800.707200][ T1874] ? rtnetlink_put_metrics+0x560/0x560 [ 2800.712688][ T1874] ? netlink_deliver_tap+0x22d/0xc00 [ 2800.717977][ T1874] ? find_held_lock+0x35/0x130 [ 2800.722757][ T1874] netlink_rcv_skb+0x17a/0x460 [ 2800.727530][ T1874] ? rtnetlink_put_metrics+0x560/0x560 [ 2800.732991][ T1874] ? netlink_ack+0xb50/0xb50 [ 2800.733009][ T1874] ? kasan_check_read+0x11/0x20 [ 2800.733030][ T1874] ? netlink_deliver_tap+0x254/0xc00 [ 2800.733049][ T1874] rtnetlink_rcv+0x1d/0x30 [ 2800.733062][ T1874] netlink_unicast+0x536/0x720 [ 2800.733082][ T1874] ? netlink_attachskb+0x770/0x770 [ 2800.733097][ T1874] ? _copy_from_iter_full+0x259/0x8f0 [ 2800.733119][ T1874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2800.773698][ T1874] netlink_sendmsg+0x8ae/0xd70 12:13:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xd) 12:13:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf) [ 2800.778477][ T1874] ? netlink_unicast+0x720/0x720 [ 2800.783426][ T1874] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2800.788727][ T1874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2800.794977][ T1874] ? security_socket_sendmsg+0x93/0xc0 [ 2800.800444][ T1874] ? netlink_unicast+0x720/0x720 [ 2800.805392][ T1874] sock_sendmsg+0xdd/0x130 [ 2800.809824][ T1874] ___sys_sendmsg+0x806/0x930 [ 2800.814512][ T1874] ? copy_msghdr_from_user+0x430/0x430 [ 2800.819989][ T1874] ? kasan_check_read+0x11/0x20 [ 2800.824849][ T1874] ? __fget+0x381/0x550 [ 2800.829017][ T1874] ? ksys_dup3+0x3e0/0x3e0 [ 2800.833440][ T1874] ? lock_downgrade+0x880/0x880 [ 2800.833467][ T1874] ? __fget_light+0x1a9/0x230 [ 2800.833484][ T1874] ? __fdget+0x1b/0x20 [ 2800.833507][ T1874] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2800.843029][ T1874] __sys_sendmsg+0x105/0x1d0 [ 2800.843047][ T1874] ? __ia32_sys_shutdown+0x80/0x80 [ 2800.843072][ T1874] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2800.843086][ T1874] ? do_syscall_64+0x26/0x610 [ 2800.843099][ T1874] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:13:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x10) [ 2800.843112][ T1874] ? do_syscall_64+0x26/0x610 [ 2800.843142][ T1874] __x64_sys_sendmsg+0x78/0xb0 [ 2800.843160][ T1874] do_syscall_64+0x103/0x610 [ 2800.843178][ T1874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2800.843202][ T1874] RIP: 0033:0x458079 [ 2800.904483][ T1874] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2800.928186][ T1874] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2800.928202][ T1874] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2800.928215][ T1874] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2800.928223][ T1874] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2800.928230][ T1874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2800.928238][ T1874] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:53 executing program 0 (fault-call:1 fault-nth:8): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x68, 0x0) 12:13:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x68, 0x0) 12:13:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x59, 0x0) 12:13:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x12) [ 2801.159050][ T2372] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 2801.187704][ T26] audit: type=1800 audit(1553170433.463:1664): pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=302 res=0 [ 2801.253836][ T2372] FAULT_INJECTION: forcing a failure. [ 2801.253836][ T2372] name failslab, interval 1, probability 0, space 0, times 0 [ 2801.284345][ T26] audit: type=1804 audit(1553170433.463:1665): pid=2311 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5367/file0/file0" dev="loop5" ino=302 res=1 [ 2801.309110][ T2372] CPU: 0 PID: 2372 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2801.331532][ T2372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2801.341591][ T2372] Call Trace: [ 2801.344892][ T2372] dump_stack+0x172/0x1f0 [ 2801.349248][ T2372] should_fail.cold+0xa/0x15 [ 2801.353853][ T2372] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2801.359668][ T2372] ? ___might_sleep+0x163/0x280 [ 2801.364560][ T2372] __should_failslab+0x121/0x190 [ 2801.369539][ T2372] should_failslab+0x9/0x14 [ 2801.374061][ T2372] kmem_cache_alloc_node_trace+0x270/0x720 [ 2801.379885][ T2372] ? kasan_unpoison_shadow+0x35/0x50 [ 2801.385191][ T2372] __kmalloc_node+0x3d/0x70 [ 2801.389702][ T2372] kvmalloc_node+0x68/0x100 [ 2801.394223][ T2372] alloc_netdev_mqs+0x821/0xd30 [ 2801.399089][ T2372] rtnl_create_link+0x22d/0xac0 [ 2801.403941][ T2372] __rtnl_newlink+0xf7b/0x16c0 [ 2801.408725][ T2372] ? rtnl_link_unregister+0x250/0x250 [ 2801.414101][ T2372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2801.420439][ T2372] ? is_bpf_text_address+0xd3/0x170 [ 2801.425625][ T2372] ? kernel_text_address+0x73/0xf0 [ 2801.430726][ T2372] ? __kernel_text_address+0xd/0x40 [ 2801.436078][ T2372] ? unwind_get_return_address+0x61/0xa0 [ 2801.441726][ T2372] ? __save_stack_trace+0x99/0x100 [ 2801.446832][ T2372] ? save_stack+0xa9/0xd0 [ 2801.451160][ T2372] ? save_stack+0x45/0xd0 [ 2801.457371][ T2372] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2801.463164][ T2372] ? kasan_kmalloc+0x9/0x10 [ 2801.467650][ T2372] ? kmem_cache_alloc_trace+0x151/0x760 [ 2801.473607][ T2372] ? rtnl_newlink+0x4b/0xa0 [ 2801.478115][ T2372] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2801.483260][ T2372] rtnl_newlink+0x69/0xa0 [ 2801.487677][ T2372] ? __rtnl_newlink+0x16c0/0x16c0 [ 2801.492704][ T2372] rtnetlink_rcv_msg+0x465/0xb00 [ 2801.497642][ T2372] ? rtnetlink_put_metrics+0x560/0x560 [ 2801.503090][ T2372] ? netlink_deliver_tap+0x22d/0xc00 [ 2801.508369][ T2372] ? find_held_lock+0x35/0x130 [ 2801.513141][ T2372] netlink_rcv_skb+0x17a/0x460 [ 2801.517892][ T2372] ? rtnetlink_put_metrics+0x560/0x560 [ 2801.523337][ T2372] ? netlink_ack+0xb50/0xb50 [ 2801.527912][ T2372] ? kasan_check_read+0x11/0x20 [ 2801.532763][ T2372] ? netlink_deliver_tap+0x254/0xc00 [ 2801.538073][ T2372] rtnetlink_rcv+0x1d/0x30 [ 2801.542476][ T2372] netlink_unicast+0x536/0x720 [ 2801.547236][ T2372] ? netlink_attachskb+0x770/0x770 [ 2801.552352][ T2372] ? _copy_from_iter_full+0x259/0x8f0 [ 2801.557712][ T2372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2801.563943][ T2372] netlink_sendmsg+0x8ae/0xd70 [ 2801.568706][ T2372] ? netlink_unicast+0x720/0x720 [ 2801.573650][ T2372] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2801.578945][ T2372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2801.585169][ T2372] ? security_socket_sendmsg+0x93/0xc0 [ 2801.590613][ T2372] ? netlink_unicast+0x720/0x720 [ 2801.595536][ T2372] sock_sendmsg+0xdd/0x130 [ 2801.599966][ T2372] ___sys_sendmsg+0x806/0x930 [ 2801.604645][ T2372] ? copy_msghdr_from_user+0x430/0x430 [ 2801.610109][ T2372] ? kasan_check_read+0x11/0x20 [ 2801.614968][ T2372] ? __fget+0x381/0x550 [ 2801.619124][ T2372] ? ksys_dup3+0x3e0/0x3e0 [ 2801.623533][ T2372] ? lock_downgrade+0x880/0x880 [ 2801.628370][ T2372] ? __fget_light+0x1a9/0x230 [ 2801.633039][ T2372] ? __fdget+0x1b/0x20 [ 2801.637093][ T2372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2801.643332][ T2372] __sys_sendmsg+0x105/0x1d0 [ 2801.647920][ T2372] ? __ia32_sys_shutdown+0x80/0x80 [ 2801.653050][ T2372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2801.658499][ T2372] ? do_syscall_64+0x26/0x610 [ 2801.663167][ T2372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2801.669236][ T2372] ? do_syscall_64+0x26/0x610 [ 2801.673918][ T2372] __x64_sys_sendmsg+0x78/0xb0 [ 2801.678665][ T2372] do_syscall_64+0x103/0x610 [ 2801.683244][ T2372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2801.689119][ T2372] RIP: 0033:0x458079 [ 2801.693013][ T2372] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2801.712615][ T2372] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2801.721019][ T2372] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2801.728982][ T2372] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2801.736949][ T2372] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2801.744911][ T2372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 12:13:54 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x600) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x200, 0x3e3b}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 12:13:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x69, 0x0) 12:13:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x2b) 12:13:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5a, 0x0) 12:13:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x69, 0x0) [ 2801.752899][ T2372] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:54 executing program 0 (fault-call:1 fault-nth:9): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x2d) [ 2801.946896][ T2863] netlink: 'syz-executor.0': attribute type 17 has an invalid length. 12:13:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6a, 0x0) [ 2802.006231][ T26] audit: type=1800 audit(1553170434.283:1666): pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=303 res=0 [ 2802.022400][ T2863] FAULT_INJECTION: forcing a failure. [ 2802.022400][ T2863] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2802.043513][ T2863] CPU: 0 PID: 2863 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2802.047482][ T26] audit: type=1804 audit(1553170434.313:1667): pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir984289828/syzkaller.ltOwDM/5368/file0/file0" dev="loop5" ino=303 res=1 [ 2802.051398][ T2863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.051405][ T2863] Call Trace: [ 2802.051429][ T2863] dump_stack+0x172/0x1f0 [ 2802.051450][ T2863] should_fail.cold+0xa/0x15 [ 2802.051468][ T2863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2802.051484][ T2863] ? __lock_acquire+0x548/0x3fb0 [ 2802.051500][ T2863] ? save_stack+0x45/0xd0 [ 2802.051516][ T2863] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2802.051530][ T2863] ? kasan_kmalloc+0x9/0x10 [ 2802.051549][ T2863] should_fail_alloc_page+0x50/0x60 [ 2802.051564][ T2863] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2802.051583][ T2863] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2802.051596][ T2863] ? find_held_lock+0x35/0x130 [ 2802.051619][ T2863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2802.051640][ T2863] cache_grow_begin+0x9c/0x860 [ 2802.159267][ T2863] ? __kmalloc_node+0x3d/0x70 [ 2802.163954][ T2863] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2802.170215][ T2863] kmem_cache_alloc_node_trace+0x658/0x720 [ 2802.176030][ T2863] ? kasan_unpoison_shadow+0x35/0x50 [ 2802.181334][ T2863] __kmalloc_node+0x3d/0x70 [ 2802.185845][ T2863] kvmalloc_node+0x68/0x100 [ 2802.190363][ T2863] alloc_netdev_mqs+0x821/0xd30 [ 2802.195234][ T2863] rtnl_create_link+0x22d/0xac0 [ 2802.200095][ T2863] __rtnl_newlink+0xf7b/0x16c0 12:13:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x2000) write$sndseq(r0, &(0x7f0000000300)=[{0x6, 0x1, 0x101, 0x1ff, @tick, {0x8b56, 0x25}, {0xfff, 0x6}, @raw8={"3460d00f072e3d8cfe4b9afa"}}, {0x8, 0x9, 0x9, 0x9, @time={0x0, 0x1c9c380}, {0x380, 0x8}, {0x4, 0x634}, @connect={{0x6, 0x7}, {0xffffffffffffffff, 0x4}}}, {0x5, 0x2, 0x3e, 0xfffffffffffffff8, @tick=0x100000000, {0x4, 0x7}, {0x0, 0x9}, @ext={0x66, &(0x7f0000000180)="8fbbba944fc54038734668a4232e17ba9407c3f6ff2c3ce8dea251a8d3fa7b8b782de83a1864eb059470af1fcca2b1eff2e0d2f07a77bdb6dedf5273866493a4788079e5d8405004745d2ec2fe596f78afcb2ae34f13beadcd4f29c20b93ef62b59f06ee410e"}}, {0x4, 0x401, 0x48de, 0x3, @time, {0x7, 0x1}, {0x100, 0x7}, @quote={{0xfffffffffffffffb, 0x6}, 0x9, &(0x7f0000000240)={0x9, 0xa920, 0x4, 0x3, @tick=0x8, {0x7fff, 0x3}, {0x0, 0x4}, @note={0xfff, 0x5d, 0x7fffffff, 0x401, 0x3e9c}}}}, {0x7fff, 0x3, 0x10001, 0x200000, @tick=0x1, {0x4, 0x8001}, {0x5, 0x6e}, @quote={{0xd23b, 0xed0}, 0x0, &(0x7f0000000280)={0x1, 0x9d, 0x0, 0x76a3, @time={0x0, 0x989680}, {0xa9e9, 0x7fff}, {0x3, 0x2931fb7b}, @control={0x101, 0x1, 0x2}}}}, {0x9, 0x80000001, 0x10000, 0x8001, @tick=0x7f, {0x2, 0x1}, {0x4, 0x6}, @note={0x4000000000000000, 0x1, 0x0, 0x8, 0x10000}}, {0x8, 0x100, 0x1475, 0x6, @time={0x0, 0x989680}, {0x80000001, 0x46c9}, {0x1}, @connect={{0x7083, 0xfff}, {0x9, 0x1}}}], 0x150) socket$pppoe(0x18, 0x1, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x7}, 0xa, {0x2, 0x4e23, @multicast2}, 'rose0\x00'}) [ 2802.204883][ T2863] ? rtnl_link_unregister+0x250/0x250 [ 2802.210258][ T2863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2802.216512][ T2863] ? is_bpf_text_address+0xd3/0x170 [ 2802.221716][ T2863] ? kernel_text_address+0x73/0xf0 [ 2802.226823][ T2863] ? __kernel_text_address+0xd/0x40 [ 2802.232012][ T2863] ? unwind_get_return_address+0x61/0xa0 [ 2802.237757][ T2863] ? __save_stack_trace+0x99/0x100 [ 2802.242861][ T2863] ? save_stack+0xa9/0xd0 [ 2802.247171][ T2863] ? save_stack+0x45/0xd0 [ 2802.251491][ T2863] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2802.257287][ T2863] ? kasan_kmalloc+0x9/0x10 [ 2802.261781][ T2863] ? kmem_cache_alloc_trace+0x151/0x760 [ 2802.267317][ T2863] ? rtnl_newlink+0x4b/0xa0 [ 2802.271809][ T2863] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2802.276944][ T2863] rtnl_newlink+0x69/0xa0 [ 2802.281269][ T2863] ? __rtnl_newlink+0x16c0/0x16c0 [ 2802.286283][ T2863] rtnetlink_rcv_msg+0x465/0xb00 [ 2802.291223][ T2863] ? rtnetlink_put_metrics+0x560/0x560 [ 2802.296679][ T2863] ? netlink_deliver_tap+0x22d/0xc00 [ 2802.301956][ T2863] ? find_held_lock+0x35/0x130 [ 2802.306715][ T2863] netlink_rcv_skb+0x17a/0x460 [ 2802.311476][ T2863] ? rtnetlink_put_metrics+0x560/0x560 [ 2802.317299][ T2863] ? netlink_ack+0xb50/0xb50 [ 2802.322118][ T2863] ? kasan_check_read+0x11/0x20 [ 2802.326968][ T2863] ? netlink_deliver_tap+0x254/0xc00 [ 2802.332250][ T2863] rtnetlink_rcv+0x1d/0x30 [ 2802.336648][ T2863] netlink_unicast+0x536/0x720 [ 2802.341432][ T2863] ? netlink_attachskb+0x770/0x770 [ 2802.346560][ T2863] ? _copy_from_iter_full+0x259/0x8f0 [ 2802.351930][ T2863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2802.358170][ T2863] netlink_sendmsg+0x8ae/0xd70 [ 2802.362943][ T2863] ? netlink_unicast+0x720/0x720 [ 2802.370179][ T2863] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2802.375468][ T2863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2802.381702][ T2863] ? security_socket_sendmsg+0x93/0xc0 [ 2802.387264][ T2863] ? netlink_unicast+0x720/0x720 [ 2802.392188][ T2863] sock_sendmsg+0xdd/0x130 [ 2802.396621][ T2863] ___sys_sendmsg+0x806/0x930 [ 2802.401491][ T2863] ? copy_msghdr_from_user+0x430/0x430 [ 2802.406964][ T2863] ? kasan_check_read+0x11/0x20 [ 2802.411905][ T2863] ? __fget+0x381/0x550 [ 2802.416064][ T2863] ? ksys_dup3+0x3e0/0x3e0 [ 2802.420477][ T2863] ? lock_downgrade+0x880/0x880 [ 2802.425325][ T2863] ? __fget_light+0x1a9/0x230 [ 2802.429996][ T2863] ? __fdget+0x1b/0x20 [ 2802.434083][ T2863] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2802.440323][ T2863] __sys_sendmsg+0x105/0x1d0 [ 2802.444909][ T2863] ? __ia32_sys_shutdown+0x80/0x80 [ 2802.450025][ T2863] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2802.455478][ T2863] ? do_syscall_64+0x26/0x610 [ 2802.460157][ T2863] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2802.466248][ T2863] ? do_syscall_64+0x26/0x610 [ 2802.470928][ T2863] __x64_sys_sendmsg+0x78/0xb0 [ 2802.475685][ T2863] do_syscall_64+0x103/0x610 [ 2802.480291][ T2863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2802.486197][ T2863] RIP: 0033:0x458079 12:13:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6a, 0x0) 12:13:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x34) 12:13:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5b, 0x0) [ 2802.490095][ T2863] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2802.509798][ T2863] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2802.518203][ T2863] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2802.526160][ T2863] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2802.534111][ T2863] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2802.542086][ T2863] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2802.550045][ T2863] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 12:13:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x3d) 12:13:55 executing program 0 (fault-call:1 fault-nth:10): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) 12:13:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x48) 12:13:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x200040) 12:13:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x5c, 0x0) 12:13:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6b, 0x0) [ 2802.863017][ T3607] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 2802.894602][ T3607] FAULT_INJECTION: forcing a failure. [ 2802.894602][ T3607] name failslab, interval 1, probability 0, space 0, times 0 12:13:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6b, 0x0) 12:13:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x4c) [ 2802.938176][ T3607] CPU: 0 PID: 3607 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2802.946110][ T3607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.956174][ T3607] Call Trace: [ 2802.959488][ T3607] dump_stack+0x172/0x1f0 [ 2802.963848][ T3607] should_fail.cold+0xa/0x15 [ 2802.968472][ T3607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2802.974309][ T3607] ? ___might_sleep+0x163/0x280 [ 2802.979164][ T3607] __should_failslab+0x121/0x190 [ 2802.984106][ T3607] should_failslab+0x9/0x14 [ 2802.988632][ T3607] __kmalloc+0x2dc/0x740 [ 2802.992862][ T3607] ? snprintf+0xbb/0xf0 [ 2802.997368][ T3607] ? vsprintf+0x40/0x40 [ 2803.001536][ T3607] ? trace_hardirqs_on+0x67/0x230 [ 2803.006655][ T3607] ? alloc_workqueue+0x13e/0xf30 [ 2803.011607][ T3607] alloc_workqueue+0x13e/0xf30 [ 2803.016378][ T3607] ? bond_init+0x17a/0x800 [ 2803.020963][ T3607] ? find_held_lock+0x35/0x130 [ 2803.025758][ T3607] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2803.031480][ T3607] ? lock_downgrade+0x880/0x880 [ 2803.036342][ T3607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.042710][ T3607] bond_init+0x1b3/0x800 [ 2803.046969][ T3607] ? bond_set_rx_mode+0x4c0/0x4c0 [ 2803.052084][ T3607] register_netdevice+0x300/0xff0 [ 2803.057124][ T3607] ? netdev_change_features+0xb0/0xb0 [ 2803.062583][ T3607] bond_newlink+0x4b/0x90 [ 2803.066910][ T3607] ? bond_changelink+0x1ac0/0x1ac0 [ 2803.072007][ T3607] __rtnl_newlink+0x107b/0x16c0 [ 2803.076862][ T3607] ? rtnl_link_unregister+0x250/0x250 [ 2803.082234][ T3607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.088562][ T3607] ? is_bpf_text_address+0xd3/0x170 [ 2803.093758][ T3607] ? kernel_text_address+0x73/0xf0 [ 2803.098871][ T3607] ? __kernel_text_address+0xd/0x40 [ 2803.104060][ T3607] ? unwind_get_return_address+0x61/0xa0 [ 2803.109699][ T3607] ? __save_stack_trace+0x99/0x100 [ 2803.114831][ T3607] ? save_stack+0xa9/0xd0 [ 2803.119150][ T3607] ? save_stack+0x45/0xd0 [ 2803.123475][ T3607] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2803.129279][ T3607] ? kasan_kmalloc+0x9/0x10 [ 2803.133767][ T3607] ? kmem_cache_alloc_trace+0x151/0x760 [ 2803.139326][ T3607] ? rtnl_newlink+0x4b/0xa0 [ 2803.143835][ T3607] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2803.149001][ T3607] rtnl_newlink+0x69/0xa0 [ 2803.153345][ T3607] ? __rtnl_newlink+0x16c0/0x16c0 [ 2803.158455][ T3607] rtnetlink_rcv_msg+0x465/0xb00 [ 2803.163404][ T3607] ? rtnetlink_put_metrics+0x560/0x560 [ 2803.168878][ T3607] ? netlink_deliver_tap+0x22d/0xc00 [ 2803.174163][ T3607] ? find_held_lock+0x35/0x130 [ 2803.178928][ T3607] netlink_rcv_skb+0x17a/0x460 [ 2803.183713][ T3607] ? rtnetlink_put_metrics+0x560/0x560 [ 2803.189168][ T3607] ? netlink_ack+0xb50/0xb50 [ 2803.193769][ T3607] ? kasan_check_read+0x11/0x20 [ 2803.198622][ T3607] ? netlink_deliver_tap+0x254/0xc00 [ 2803.203908][ T3607] rtnetlink_rcv+0x1d/0x30 [ 2803.208353][ T3607] netlink_unicast+0x536/0x720 [ 2803.213121][ T3607] ? netlink_attachskb+0x770/0x770 [ 2803.218249][ T3607] ? _copy_from_iter_full+0x259/0x8f0 [ 2803.223619][ T3607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.229852][ T3607] netlink_sendmsg+0x8ae/0xd70 [ 2803.234615][ T3607] ? netlink_unicast+0x720/0x720 [ 2803.239552][ T3607] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2803.244854][ T3607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.251098][ T3607] ? security_socket_sendmsg+0x93/0xc0 [ 2803.256557][ T3607] ? netlink_unicast+0x720/0x720 [ 2803.261492][ T3607] sock_sendmsg+0xdd/0x130 [ 2803.265906][ T3607] ___sys_sendmsg+0x806/0x930 [ 2803.270580][ T3607] ? copy_msghdr_from_user+0x430/0x430 [ 2803.276027][ T3607] ? kasan_check_read+0x11/0x20 [ 2803.280880][ T3607] ? __fget+0x381/0x550 [ 2803.285049][ T3607] ? ksys_dup3+0x3e0/0x3e0 [ 2803.289445][ T3607] ? lock_downgrade+0x880/0x880 [ 2803.294288][ T3607] ? __fget_light+0x1a9/0x230 [ 2803.298968][ T3607] ? __fdget+0x1b/0x20 [ 2803.309913][ T3607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2803.316146][ T3607] __sys_sendmsg+0x105/0x1d0 [ 2803.320735][ T3607] ? __ia32_sys_shutdown+0x80/0x80 [ 2803.325845][ T3607] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2803.331285][ T3607] ? do_syscall_64+0x26/0x610 [ 2803.335941][ T3607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2803.342004][ T3607] ? do_syscall_64+0x26/0x610 [ 2803.346677][ T3607] __x64_sys_sendmsg+0x78/0xb0 [ 2803.351421][ T3607] do_syscall_64+0x103/0x610 [ 2803.356002][ T3607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2803.361906][ T3607] RIP: 0033:0x458079 [ 2803.365791][ T3607] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:13:55 executing program 0 (fault-call:1 fault-nth:11): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) [ 2803.385375][ T3607] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2803.393779][ T3607] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2803.401759][ T3607] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2803.409730][ T3607] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2803.417701][ T3607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2803.425654][ T3607] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 [ 2803.463282][ T3655] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 2803.471795][ T3655] FAULT_INJECTION: forcing a failure. [ 2803.471795][ T3655] name failslab, interval 1, probability 0, space 0, times 0 [ 2803.485070][ T3655] CPU: 0 PID: 3655 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2803.485089][ T3655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2803.503018][ T3655] Call Trace: [ 2803.506323][ T3655] dump_stack+0x172/0x1f0 [ 2803.510675][ T3655] should_fail.cold+0xa/0x15 [ 2803.515275][ T3655] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2803.521361][ T3655] ? ___might_sleep+0x163/0x280 [ 2803.526231][ T3655] __should_failslab+0x121/0x190 [ 2803.531182][ T3655] should_failslab+0x9/0x14 [ 2803.535702][ T3655] kmem_cache_alloc_trace+0x2d1/0x760 [ 2803.541151][ T3655] ? rcu_read_lock_sched_held+0x110/0x130 [ 2803.541172][ T3655] ? __kmalloc+0x5d5/0x740 [ 2803.551286][ T3655] ? snprintf+0xbb/0xf0 [ 2803.551310][ T3655] alloc_workqueue_attrs+0x82/0x120 [ 2803.551328][ T3655] alloc_workqueue+0x17b/0xf30 [ 2803.551344][ T3655] ? bond_init+0x17a/0x800 [ 2803.551360][ T3655] ? find_held_lock+0x35/0x130 [ 2803.551381][ T3655] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2803.551401][ T3655] ? lock_downgrade+0x880/0x880 [ 2803.585263][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.591520][ T3655] bond_init+0x1b3/0x800 [ 2803.595777][ T3655] ? bond_set_rx_mode+0x4c0/0x4c0 [ 2803.600815][ T3655] register_netdevice+0x300/0xff0 [ 2803.605846][ T3655] ? netdev_change_features+0xb0/0xb0 [ 2803.605873][ T3655] bond_newlink+0x4b/0x90 [ 2803.605890][ T3655] ? bond_changelink+0x1ac0/0x1ac0 [ 2803.605905][ T3655] __rtnl_newlink+0x107b/0x16c0 [ 2803.605933][ T3655] ? rtnl_link_unregister+0x250/0x250 [ 2803.605954][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.630925][ T3655] ? is_bpf_text_address+0xd3/0x170 [ 2803.630943][ T3655] ? kernel_text_address+0x73/0xf0 [ 2803.630958][ T3655] ? __kernel_text_address+0xd/0x40 [ 2803.630976][ T3655] ? unwind_get_return_address+0x61/0xa0 [ 2803.630991][ T3655] ? __save_stack_trace+0x99/0x100 [ 2803.631021][ T3655] ? save_stack+0xa9/0xd0 [ 2803.631037][ T3655] ? save_stack+0x45/0xd0 [ 2803.631053][ T3655] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2803.631067][ T3655] ? kasan_kmalloc+0x9/0x10 [ 2803.631082][ T3655] ? kmem_cache_alloc_trace+0x151/0x760 [ 2803.631095][ T3655] ? rtnl_newlink+0x4b/0xa0 [ 2803.631109][ T3655] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2803.631193][ T3655] rtnl_newlink+0x69/0xa0 [ 2803.652846][ T3655] ? __rtnl_newlink+0x16c0/0x16c0 [ 2803.652863][ T3655] rtnetlink_rcv_msg+0x465/0xb00 [ 2803.652884][ T3655] ? rtnetlink_put_metrics+0x560/0x560 [ 2803.652908][ T3655] ? netlink_deliver_tap+0x22d/0xc00 [ 2803.652924][ T3655] ? find_held_lock+0x35/0x130 [ 2803.652944][ T3655] netlink_rcv_skb+0x17a/0x460 [ 2803.678066][ T3655] ? rtnetlink_put_metrics+0x560/0x560 [ 2803.678085][ T3655] ? netlink_ack+0xb50/0xb50 [ 2803.678104][ T3655] ? kasan_check_read+0x11/0x20 [ 2803.678126][ T3655] ? netlink_deliver_tap+0x254/0xc00 [ 2803.678156][ T3655] rtnetlink_rcv+0x1d/0x30 [ 2803.678171][ T3655] netlink_unicast+0x536/0x720 [ 2803.678189][ T3655] ? netlink_attachskb+0x770/0x770 [ 2803.707150][ T3655] ? _copy_from_iter_full+0x259/0x8f0 [ 2803.707172][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.707192][ T3655] netlink_sendmsg+0x8ae/0xd70 [ 2803.707220][ T3655] ? netlink_unicast+0x720/0x720 [ 2803.707240][ T3655] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2803.707256][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2803.707276][ T3655] ? security_socket_sendmsg+0x93/0xc0 [ 2803.732441][ T3655] ? netlink_unicast+0x720/0x720 [ 2803.732462][ T3655] sock_sendmsg+0xdd/0x130 [ 2803.732480][ T3655] ___sys_sendmsg+0x806/0x930 [ 2803.732500][ T3655] ? copy_msghdr_from_user+0x430/0x430 [ 2803.732526][ T3655] ? kasan_check_read+0x11/0x20 [ 2803.732546][ T3655] ? __fget+0x381/0x550 [ 2803.732567][ T3655] ? ksys_dup3+0x3e0/0x3e0 [ 2803.732581][ T3655] ? lock_downgrade+0x880/0x880 [ 2803.732606][ T3655] ? __fget_light+0x1a9/0x230 [ 2803.732622][ T3655] ? __fdget+0x1b/0x20 [ 2803.732634][ T3655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2803.732654][ T3655] __sys_sendmsg+0x105/0x1d0 [ 2803.732671][ T3655] ? __ia32_sys_shutdown+0x80/0x80 [ 2803.732705][ T3655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2803.747576][ T3655] ? do_syscall_64+0x26/0x610 [ 2803.747593][ T3655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2803.747607][ T3655] ? do_syscall_64+0x26/0x610 [ 2803.747630][ T3655] __x64_sys_sendmsg+0x78/0xb0 [ 2803.747648][ T3655] do_syscall_64+0x103/0x610 [ 2803.747667][ T3655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2803.747680][ T3655] RIP: 0033:0x458079 [ 2803.747699][ T3655] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2803.757372][ T3655] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2803.757387][ T3655] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2803.757396][ T3655] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2803.757405][ T3655] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2803.757414][ T3655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2803.757423][ T3655] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 [ 2803.875042][ T3655] WARNING: CPU: 0 PID: 3655 at kernel/locking/lockdep.c:4925 lockdep_unregister_key+0x1ef/0x4c0 [ 2803.988117][ T3655] Kernel panic - not syncing: panic_on_warn set ... [ 2803.994756][ T3655] CPU: 0 PID: 3655 Comm: syz-executor.0 Not tainted 5.1.0-rc1+ #31 [ 2803.996393][ T3876] kobject: 'loop5' (0000000092688acd): kobject_uevent_env 12:13:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6c, 0x0) 12:13:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x6c, 0x0) 12:13:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x68) [ 2804.002638][ T3655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2804.002643][ T3655] Call Trace: [ 2804.002665][ T3655] dump_stack+0x172/0x1f0 [ 2804.002681][ T3655] ? lockdep_unregister_key+0x130/0x4c0 [ 2804.002694][ T3655] panic+0x2cb/0x65c [ 2804.002708][ T3655] ? __warn_printk+0xf3/0xf3 [ 2804.002721][ T3655] ? lockdep_unregister_key+0x1ef/0x4c0 [ 2804.002735][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2804.002749][ T3655] ? __warn.cold+0x5/0x45 12:13:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f0000000040), 0x0) fchdir(r0) open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x3) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 2804.002762][ T3655] ? lockdep_unregister_key+0x1ef/0x4c0 [ 2804.002776][ T3655] __warn.cold+0x20/0x45 [ 2804.002789][ T3655] ? lockdep_unregister_key+0x1ef/0x4c0 [ 2804.002802][ T3655] report_bug+0x263/0x2b0 [ 2804.002897][ T3655] do_error_trap+0x11b/0x200 [ 2804.016101][ T3876] kobject: 'loop5' (0000000092688acd): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2804.020010][ T3655] do_invalid_op+0x37/0x50 [ 2804.020026][ T3655] ? lockdep_unregister_key+0x1ef/0x4c0 [ 2804.020040][ T3655] invalid_op+0x14/0x20 [ 2804.020053][ T3655] RIP: 0010:lockdep_unregister_key+0x1ef/0x4c0 [ 2804.020067][ T3655] Code: 00 00 00 00 00 fc ff df 4c 89 c2 48 c1 ea 03 80 3c 02 00 0f 85 c9 02 00 00 48 b8 00 02 00 00 00 00 ad de 49 89 44 24 08 eb 02 <0f> 0b ba 01 00 00 00 4c 89 e6 4c 89 ff e8 8f de ff ff 4c 89 ff e8 [ 2804.020074][ T3655] RSP: 0018:ffff88805c056f28 EFLAGS: 00010046 [ 2804.020085][ T3655] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffffffff12bcb4b [ 2804.020092][ T3655] RDX: 1ffffffff146831c RSI: 0000000000000000 RDI: ffffffff8a3418e0 12:13:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x6c) [ 2804.020099][ T3655] RBP: ffff88805c056f58 R08: 1ffff1100b80add9 R09: ffffed100b80adda [ 2804.020107][ T3655] R10: ffffed100b80add9 R11: 0000000000000003 R12: ffff888063af4658 [ 2804.020115][ T3655] R13: dffffc0000000000 R14: 0000000000000282 R15: ffffffff8a0b9748 [ 2804.020145][ T3655] ? lockdep_unregister_key+0xa7/0x4c0 [ 2804.020163][ T3655] alloc_workqueue+0xc52/0xf30 [ 2804.020185][ T3655] ? bond_init+0x17a/0x800 [ 2804.187384][ T3876] kobject: 'loop2' (00000000b2c3b483): kobject_uevent_env [ 2804.190205][ T3655] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 2804.190229][ T3655] ? lock_downgrade+0x880/0x880 [ 2804.190243][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2804.190263][ T3655] bond_init+0x1b3/0x800 [ 2804.190279][ T3655] ? bond_set_rx_mode+0x4c0/0x4c0 [ 2804.190301][ T3655] register_netdevice+0x300/0xff0 [ 2804.195120][ T3876] kobject: 'loop2' (00000000b2c3b483): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2804.199458][ T3655] ? netdev_change_features+0xb0/0xb0 [ 2804.199476][ T3655] bond_newlink+0x4b/0x90 [ 2804.199490][ T3655] ? bond_changelink+0x1ac0/0x1ac0 12:13:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x74) [ 2804.199503][ T3655] __rtnl_newlink+0x107b/0x16c0 [ 2804.199522][ T3655] ? rtnl_link_unregister+0x250/0x250 [ 2804.199535][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2804.199553][ T3655] ? is_bpf_text_address+0xd3/0x170 [ 2804.199566][ T3655] ? kernel_text_address+0x73/0xf0 [ 2804.199577][ T3655] ? __kernel_text_address+0xd/0x40 [ 2804.199591][ T3655] ? unwind_get_return_address+0x61/0xa0 [ 2804.199602][ T3655] ? __save_stack_trace+0x99/0x100 [ 2804.199622][ T3655] ? save_stack+0xa9/0xd0 [ 2804.199636][ T3655] ? save_stack+0x45/0xd0 [ 2804.199651][ T3655] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2804.199671][ T3655] ? kasan_kmalloc+0x9/0x10 [ 2804.324221][ T3655] ? kmem_cache_alloc_trace+0x151/0x760 [ 2804.329769][ T3655] ? rtnl_newlink+0x4b/0xa0 [ 2804.334273][ T3655] ? rtnetlink_rcv_msg+0x465/0xb00 [ 2804.340885][ T3655] rtnl_newlink+0x69/0xa0 [ 2804.345218][ T3655] ? __rtnl_newlink+0x16c0/0x16c0 [ 2804.350250][ T3655] rtnetlink_rcv_msg+0x465/0xb00 [ 2804.355221][ T3655] ? rtnetlink_put_metrics+0x560/0x560 [ 2804.360714][ T3655] ? netlink_deliver_tap+0x22d/0xc00 12:13:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x7a) [ 2804.365998][ T3655] ? find_held_lock+0x35/0x130 [ 2804.370765][ T3655] netlink_rcv_skb+0x17a/0x460 [ 2804.375534][ T3655] ? rtnetlink_put_metrics+0x560/0x560 [ 2804.380995][ T3655] ? netlink_ack+0xb50/0xb50 [ 2804.385590][ T3655] ? kasan_check_read+0x11/0x20 [ 2804.390450][ T3655] ? netlink_deliver_tap+0x254/0xc00 [ 2804.395744][ T3655] rtnetlink_rcv+0x1d/0x30 [ 2804.400256][ T3655] netlink_unicast+0x536/0x720 [ 2804.405044][ T3655] ? netlink_attachskb+0x770/0x770 [ 2804.410162][ T3655] ? _copy_from_iter_full+0x259/0x8f0 [ 2804.415540][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2804.421991][ T3655] netlink_sendmsg+0x8ae/0xd70 [ 2804.426757][ T3655] ? netlink_unicast+0x720/0x720 [ 2804.427193][ T3876] kobject: 'loop2' (00000000b2c3b483): kobject_uevent_env [ 2804.431697][ T3655] ? tomoyo_socket_sendmsg+0x26/0x30 [ 2804.431712][ T3655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2804.431724][ T3655] ? security_socket_sendmsg+0x93/0xc0 [ 2804.431736][ T3655] ? netlink_unicast+0x720/0x720 [ 2804.431750][ T3655] sock_sendmsg+0xdd/0x130 [ 2804.431764][ T3655] ___sys_sendmsg+0x806/0x930 [ 2804.431779][ T3655] ? copy_msghdr_from_user+0x430/0x430 [ 2804.431798][ T3655] ? kasan_check_read+0x11/0x20 [ 2804.431814][ T3655] ? __fget+0x381/0x550 [ 2804.431834][ T3655] ? ksys_dup3+0x3e0/0x3e0 [ 2804.444651][ T3876] kobject: 'loop2' (00000000b2c3b483): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2804.450572][ T3655] ? lock_downgrade+0x880/0x880 [ 2804.450591][ T3655] ? __fget_light+0x1a9/0x230 [ 2804.450603][ T3655] ? __fdget+0x1b/0x20 [ 2804.450617][ T3655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2804.450634][ T3655] __sys_sendmsg+0x105/0x1d0 [ 2804.450650][ T3655] ? __ia32_sys_shutdown+0x80/0x80 [ 2804.450670][ T3655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2804.450684][ T3655] ? do_syscall_64+0x26/0x610 [ 2804.450705][ T3655] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2804.548900][ T3655] ? do_syscall_64+0x26/0x610 [ 2804.553583][ T3655] __x64_sys_sendmsg+0x78/0xb0 [ 2804.558358][ T3655] do_syscall_64+0x103/0x610 [ 2804.563321][ T3655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2804.569301][ T3655] RIP: 0033:0x458079 [ 2804.573721][ T3655] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2804.593328][ T3655] RSP: 002b:00007f9522f8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2804.602125][ T3655] RAX: ffffffffffffffda RBX: 00007f9522f8ec90 RCX: 0000000000458079 [ 2804.610465][ T3655] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 2804.618452][ T3655] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2804.626535][ T3655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9522f8f6d4 [ 2804.634582][ T3655] R13: 00000000004c569b R14: 00000000004d95c0 R15: 0000000000000004 [ 2804.643564][ T3655] Kernel Offset: disabled [ 2804.647895][ T3655] Rebooting in 86400 seconds..