ffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x800) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000140)=0x9, 0x4) 22:23:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000000)='map_files\x00') getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xc9, 0x20, 0xffffffffffffff9c}, 0x2c) [ 805.934572] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 805.989556] REISERFS (device loop6): using ordered data mode [ 805.995557] reiserfs: using flush barriers [ 806.028989] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 22:23:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffffffff, 0x20000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={r1, @in={{0x2, 0x4e24, @multicast2}}, 0x4, 0xfff, 0x3, 0x6, 0xb0}, &(0x7f00000001c0)=0x98) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000080)=0x5) 22:23:46 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 806.040524] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:23:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xf8, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000340)={0x0, r1}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) 22:23:46 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000480)="0f05e634437a904de3cd63c300000000e7944425e67dccb34116f7ae50a22236be9be7fec35ee5ebb71953f071bbd1ae91aa046bc69724d539f201246c84d75b16836188b35ab35cb5bf03193a72b47c6b41f56bd878c49bdb5748eac20eacbfa904ff959afc7452d057e2ebd61637bbce186d45542b754d915f6b5edc9cc2ebd8e689d6351c01167a6a7e9fb85921b85b91163d9cd2fe78741a83d5", &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000140)) read(r3, &(0x7f0000000400)=""/100, 0x64) 22:23:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x502, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x9, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000100)={0x0, r2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0xffff, 0x4) 22:23:46 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x800) 22:23:46 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 806.587599] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 806.612901] REISERFS (device loop6): using ordered data mode [ 806.618885] reiserfs: using flush barriers [ 806.647374] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 806.658615] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:23:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280)="a60a80b31dc76034e702bcfd5675bb6710b579ab28eb1730b7f12fce2914696c5ab488c820f571bb382fd0c916603dfaf2bb2e6f3439e8f9615783d6ae05a1a481e88a729dd06263d0d9bae8b67f738fbeb15e83b437c307fa374f42e15f493213b466e9529a4f6e4cbd6df9418146bd9a0dc0bee4d204d84ee1271fec253d7aae1c6a0a01a290abcb6e22b2ff1683e9cd6403e043f48637eff346895c", &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3ff, 0x202000) ioctl$void(r1, 0xc0045878) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000100)={0x6, 0x2, 0x4c, 0x5}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000140)) 22:23:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x52, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:47 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:47 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffb) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x14f, 0x9, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0x43) r1 = socket(0x40000000015, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000900)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beeb5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb4860262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376", 0x47e, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) sendto$inet(r1, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f00000005c0), &(0x7f0000000980)=0xc) r3 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r0) r4 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r3) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x13, 0x6}, &(0x7f0000000840)=0x0) timer_gettime(r5, &(0x7f0000000a80)) setgid(0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400002, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}, 0x2d}) r7 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000), 0x0, 0x0, r4) ioctl$BLKTRACETEARDOWN(r6, 0x1276, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000580)={0x5, 0x81f, 0x7, 0x3ff, 0x6}) r8 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f00000000c0)="7f", 0x1, r7) r9 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f0000000140), &(0x7f0000000280), 0x240, r0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000800)=0x80000000003, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000340)={r8, r9, r9}, &(0x7f0000000600)=""/132, 0xff7d, 0x0) syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0x0, 0x800) [ 807.024179] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:23:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x6, 0x20, 0xffffffffffffff9c}, 0x2c) [ 807.071733] REISERFS (device loop6): using ordered data mode [ 807.077699] reiserfs: using flush barriers 22:23:47 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x5) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) io_setup(0xccb, &(0x7f0000000000)=0x0) io_destroy(r1) [ 807.149870] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 807.161169] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:23:47 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r5, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x55, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:47 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xed, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:47 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000480)="0f05e634437a904de3cd63c300000000e7944425e67dccb34116f7ae50a22236be9be7fec35ee5ebb71953f071bbd1ae91aa046bc69724d539f201246c84d75b16836188b35ab35cb5bf03193a72b47c6b41f56bd878c49bdb5748eac20eacbfa904ff959afc7452d057e2ebd61637bbce186d45542b754d915f6b5edc9cc2ebd8e689d6351c01167a6a7e9fb85921b85b91163d9cd2fe78741a83d5", &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000140)) read(r3, &(0x7f0000000400)=""/100, 0x64) 22:23:47 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4b5, 0x105000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="6cbd222b3c197b565c4bf585f7cd570e", 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100)=0x5f39, 0x4) [ 807.533020] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:23:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:48 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r5, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x10, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="890000", @ANYRES16=r1, @ANYBLOB="20002cbd7000fddbdf250c0000005c00020008000b000a00000008000400f70900000800090000000000080007000200000014000100ff01000000000000000000000000000108000300010000001400010000000000000000000000000000000000080007000800000008000500a62f000008000500a8dc0000"], 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80400, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={0x0, 0xffffffffffffff81}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000480)=r4, 0x4) r5 = semget(0x0, 0x7, 0x200) clock_gettime(0x7, &(0x7f0000000740)={0x0, 0x0}) semtimedop(r5, &(0x7f00000004c0)=[{0x3, 0x7f, 0x1000}, {0x7, 0x0, 0x1000}], 0x2, &(0x7f0000000540)={r6, r7+10000000}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000240)={r8, @in6={{0xa, 0x4e21, 0xa0, @loopback, 0x7}}, [0x33, 0x0, 0x1, 0x4, 0x100, 0x2, 0xfffffffffffffffd, 0x5a8afcd9, 0x4, 0x7fffffff, 0x7, 0x10001, 0x80000001, 0x7, 0xdc8]}, &(0x7f0000000340)=0x100) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x10) 22:23:48 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:48 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) [ 807.916945] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:23:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x61, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:48 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x2, @ipv4={[], [], @remote}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000100)={0x5, 0xfffffffffffffffa, 0xbd4, 0x2, 0x8, 0xffffffffffffffc0}) lseek(r0, 0x0, 0x3) 22:23:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={r1}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={r2, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000180)={0x8, {{0xa, 0x4e23, 0xffffffffffff62cb, @mcast2, 0xffff}}, {{0xa, 0x4e21, 0x3, @empty, 0x4}}}, 0x108) 22:23:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:48 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:48 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r5, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 808.258657] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:23:48 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000480)="0f05e634437a904de3cd63c300000000e7944425e67dccb34116f7ae50a22236be9be7fec35ee5ebb71953f071bbd1ae91aa046bc69724d539f201246c84d75b16836188b35ab35cb5bf03193a72b47c6b41f56bd878c49bdb5748eac20eacbfa904ff959afc7452d057e2ebd61637bbce186d45542b754d915f6b5edc9cc2ebd8e689d6351c01167a6a7e9fb85921b85b91163d9cd2fe78741a83d5", &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000140)) 22:23:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xd8, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:48 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x8, 0x241) accept$unix(r1, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) 22:23:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) sched_setattr(r3, &(0x7f00000001c0)={0x30, 0x0, 0x1, 0x8, 0x3, 0x2, 0x704f, 0x7}, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) clone(0x10240000, &(0x7f0000000000)="06ac34d5baf89224f162c989a360615188dbcb3363652d0e58d7ec30cc3790c49f09ff367c78e58ae8578d1e5318d887be1e3ecdddb2a334cc7acd2bfc9c2f19e9227b368476dfd69f5087", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000280)="9f1bb09219308cc9ee92148d3189807dfbcdd79e38a88f224f0b6aecff4252e38abee4210cec26b6cf89223818988c08f9cb4132b25c13e52ca37ba9723b17c87a6de54be1d821b4d71316e4410038641693f508ef7bd14bd7fe1b0d6d5626a2d219caa21439fb6bbefdf35fc6073a6692a0df8467b85129e9903a95b37ca0f80eec03b47eb71ccc2472155e362c319bf774e2bd804882c72eede93e0023d42408aa1534f9") read(r2, &(0x7f0000000400)=""/100, 0x64) 22:23:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:49 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000080), 0x8000, &(0x7f0000013900)) 22:23:49 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x65, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x20) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x201, 0x7f, 0x6baa, 0x2, 0xbf, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x1, 0x5, 0x6}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e21, 0x80, @dev={0xfe, 0x80, [], 0x18}, 0x5}}}, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:49 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:23:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xee, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:49 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:23:49 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000080), 0x8000, &(0x7f0000013900)) 22:23:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:49 executing program 2: r0 = socket$inet6(0xa, 0x10009, 0x8010000000000080) mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000)=0x10000, 0x8ec6, 0x1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x800}, &(0x7f00000000c0)=0x8) r1 = getpgrp(0xffffffffffffffff) get_mempolicy(&(0x7f0000000080), &(0x7f00000001c0), 0x43, &(0x7f0000ff6000/0xa000)=nil, 0x7) r2 = dup(r0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() fstat(r0, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000003f80)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000003d80)=[{&(0x7f00000002c0)={0x3a48, 0x3e, 0x8, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x48, 0x13, @binary="8bc771e2442b4a76c28a316fab9ef059e8fca7a482cd336b0ca79640cefcc5456a259103d2c1df972e80b7d983137ac2c1f47efb857959ad619f7a6fd4ad6e8693b0"}, @nested={0xa4, 0x49, [@typed={0x44, 0x75, @binary="b2c63128e44d490e082470a99438e0e35252c0930db8aad5a19bc7e79959ceea8f582d2c145168a3f33ad99da222ea77979360b93af3bc2aefae149422c1"}, @generic="f6738371390a80ffd6081a4a5a1d8c08109d838b15bafa911c6925dc9ab99e481d950526a628c56b2ca74806bc8a8b97dad4b549451c1e8eaeac622157984c9648be357e6f56b27d16c351", @typed={0x10, 0x12, @str='wlan0ppp0\\\x00'}]}, @nested={0x194, 0x7e, [@generic="739c8b771d81178b17decb6444f1cc32444196099c3ffdde1613c300565e32b33df7d212e779232eb97eb8105ed2811455b7aadd281e27cc87f379433bef27d86a55d4d7a5e87f36690f2e591ad5c744286346030bfe17933b4e70d57afc2ba4f4a265e2cd33fbc59b508de67fc6db823954bcf1da90ee174d8893a68c077e8e8367811604593df5adf290b1c8e810fd", @typed={0x8, 0x67, @uid=r3}, @typed={0x8, 0x38, @uid=r4}, @typed={0x8, 0x41, @u32=0x3}, @typed={0xc, 0x81, @u64=0x8}, @typed={0xd8, 0x22, @binary="e845c0a42920a111d6421fd6cb8fc775f9dcdb5715e29b34f303778079e93e06a54ac1bd02c67e8c9c60495de2dc99c8cfd9979a2d291d51498e54bd972f6e10fe5b7b49406a7bb242b941fbc58bc2e9446387f68fbf0f450419c28f249b9b3fac655072acc9b93fccafd79db664e82c5202edb89b3015517a2ba7818e3b1f0b70cd92a43b6793de09cff0d5284736498d56c67fe08018ec848cf14a09659a6667d142e6ceb47c8b20ed5ee6c0c39b708645ce3f6d2a9f82404f77e57c9c7db2ea564c6d0086765697918710db04414015efdf06"}, @typed={0x4, 0x11}]}, @nested={0x11ac, 0x27, [@typed={0x1004, 0x5e, @binary="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"}, @typed={0x8, 0x87, @pid=r1}, @typed={0x8, 0x2f, @pid=r1}, @generic="336039c72e9969782a0ed6fecc2885a069c77c5370eeadf554de208bf54c2556408f11ff4b058762a73ca3b850b64194c7437feaec6ea3e2a224e084fd2f21a7baf35d2f1fec37d13ce17f063d6c5fbd56c51680c19ff047f2fafc15df91073d49b3b6afd3f741d0bfa0048f84d53dab2476b9ca54357fdc1c453906960caaa20781085f89158ec3f15eb993e38f65cc8e70744dc7df3441cde93942eb349cc8c98349f0e2a3e83f0e6c0cc4", @typed={0x8, 0x48, @pid=r1}, @typed={0x8, 0x33, @fd=r0}, @typed={0x8, 0x2, @u32=0xaea6}, @generic="9166bf7cf77b3e93738375e2518c30c237cdf38252fc6373ae613d694f865338c9f23d874baaf35015ee508f6023da90decf3042ac0c6abe4206bacbd2c3ce680889889d829472837d49aad188ad8aba192eb13927d9e13fa4add9b238486b74223dff89f60623a9ba738b4e32329aa6a69e28ef4addc38ecd19eaf4058366e66bed9e8cde72007033237f9b88f92e84c590876e21a1fd89f664e4488f6ef4ed497da7248a90b75cc16339298bf4c7e749e20415539ff6af552e364d92fec89f8d02ff059ea592b4b521d03ba3"]}, @nested={0x10d8, 0x49, [@generic="c8152e4ece2baed06c93e461e2a669b6de2ec8c2f1bbec28e4845c60a55f0982e06169079b47648d76e7d69f3a74942ed43bfaa79fed715b424402afe2461ad93cc14decabaa5fadbcb6ba4b4dce0c995417c53b4403ad5bf300efc520f7dbc817d0ba2f9d6bc55653adfd07debb0f3d6214575e34c1a6fbbc0ba4e16b40a2e9b0a499a016017ff1de153f7100e22bd3d6c219210fd45b353ba1282c3e9765b6b5dd3416126acb58f038b977a16fc12d53b2229eedde1179c49c5907f7a0dafaa0d30c76a723d9a3b013636ec654ca", @generic="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", @typed={0x4, 0x4f}]}, @generic="1aed26bce45c9130e552cb473974a6e4f6bfc08aa3f9acef837a525c68e9804d33fda3a562b0cc886403a32b08918c07ac2618683008f8469d91daff8604a2e7f0ee31f8207325cc29fa8f3321f4264388277502fa360703ee59a452ddea5031a8f0ade79b5573e817d5c371ce14cc9ee1b858bab9ba41d6e5c3ee4058bb4013de5a5551632c2791", @typed={0x8, 0x7, @u32=0x80000001}, @nested={0x2a0, 0x50, [@generic="c134c5e2e5d6ba162ed524bc7805fde80df6ea4e9c62088b77f69681d9ecefdd1780256745b4b7fcabb345d44450f55cd385c584916eb2c4ecc7e491fb0c154347fb0cf74b5a30f4ea472bc28f40", @generic="309c31dea636774211a8b502ea6433ab326c7d69c47f4d44f22967cf20daec800670cf1de01e82c1218eb8e1f58ea0c9fa4127991bc752d0a721c64c3313278da04ded3a86ba5005fa03052ca3b7b826802d18573da566c2ac007cebc85811a7523a67decd3866c3626f", @generic="571fdd1ff6e7d22fe7147395166c6feaaff519b485fbb6c85004459d6178ea572cb6aa40a3877155556c782143207d09e73b776b9367382fb61b8db0cf015d8e8f9be3e1f908919a97e8fded6ad3bbe8ef777ac31a1f9e087ac15d4778f8105962ec5c1453e2f9e8da8115fbff48d1170cf5103202d6bb53eb7a4db9df1646628bf72238bb08f9db07b93c2bf74dae43ed68be8cc9089b95d7933050924ab9c4981df8a80853a7eab734728c6441e3dbb5680d397ad711186ba782609cddfbeac317eb833d7e2be359fce21a6d0e", @generic="881d78b622a9e1341f36", @generic="3f6de7d7df5bb2504d728ff8b6349d2f17d6111ff7a126e83d4d2ea9cce04ab1ff74e24538643796f90fb38b320b9be42a6cc416e068c2f094c1b36166cffeffedbd1ead99be1636c73e2c53a770a5f3", @generic="53ce1370", @generic="f3e64678a847c265fad66c6f8c078d0459b1aac1d1c427a016b610e6dc2f109588f08c50cb5523ed90e025625f6f92871f5084cf168dc4af3b1b4516cd0e23cfce9e705554ba89e4f6674b62962efd4c68f7d8584e40939e77a5de382a5b9ef1115278d3b6881c1a92af9c836eafde55ac0569540d0b50b7aca513e2f7a4b6b0752f2b090d3d2ed2b8cce933a0bf8bc915175bc735e02ef047979cb007ceeddda746c4c7ab691ac45652832970017cdad51f67626a8891"]}, @nested={0x11fc, 0x1e, [@typed={0x1004, 0x5c, @binary="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"}, @generic="d4b834794cdef291c6683d07747a5e227978e91359c10a1c441ce4a47043ace734e6f249b85fc0feb35179f9f2887837d41c", @generic="08353070b833c0f76a85df53bc88a173c1079dddbf87f716ea7717f80637f5a86e44b072080dc6d9b63deb4adce54ed4bff55dfef63b551922a3bfe980867a59d2d085cf096889b88062fd8af5500695bc347239fb44afe686c7bda9286f47853471c42e64f27f44b8e47e0a55299c7fb53279befc4ebcb01f4c21aa0cc4ebb63be9526c8cd52cd108fc6c4bbadf59", @typed={0x8, 0x38, @pid=r1}, @typed={0x8, 0x67, @fd=r0}, @typed={0xc, 0x17, @str=',user&\x00'}, @generic="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", @typed={0x8, 0x14, @str=':]\x00'}, @typed={0x14, 0x81, @ipv6=@remote}]}, @typed={0x8, 0x30, @pid=r1}]}, 0x3a48}, {&(0x7f0000003d40)={0x24, 0x37, 0x301, 0x70bd25, 0x25dfdbfe, "", [@typed={0x14, 0x44, @ipv6=@mcast2}]}, 0x24}], 0x2, &(0x7f0000003f00)=[@rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r1, r5, r6}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x68}, 0x20040010) move_pages(r1, 0x0, &(0x7f0000000080), &(0x7f0000000140)=[0x3, 0x0, 0x7b, 0x21f, 0x401], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x4, 0xffffffffffffffe5) 22:23:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xac, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:49 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 22:23:49 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:49 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x6, 0x9, 0x9}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080)=0x3ff, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xef, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:50 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000080), 0x8000, &(0x7f0000013900)) 22:23:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:50 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='-\x00'}, 0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={r2}, 0x8) 22:23:50 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:23:50 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x69, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:50 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000080) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/205, &(0x7f00000002c0)=0xcd) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x3d) r1 = open(&(0x7f0000000100)='./file0\x00', 0x8200, 0x44) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000140)={0x8, 0x2, {0x3, 0x3, 0x2, 0x2, 0x30}}) lseek(r1, 0x15, 0xb) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) 22:23:50 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:50 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:50 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x2a, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:50 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x42, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:50 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:23:50 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:50 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:50 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:50 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = msgget$private(0x0, 0x22d) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000000)=""/28) 22:23:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x5, 0x8010000000000085) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x9a, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:51 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r3, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) 22:23:51 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f", 0x1f, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:51 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x3e, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x3ffe, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r2, 0x0, 0x0, @in={0x2, 0x4e21, @local}}}, 0x90) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000240)={0x1}) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000280)) 22:23:51 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f", 0x1f, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:51 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 22:23:51 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 22:23:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = userfaultfd(0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r3, 0x90e4ebada08437f8, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x8040) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:23:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:51 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x87, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x1, 0x6, 0x101, 0x4, 0x101, 0x100000001}}, 0x8) 22:23:51 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:51 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f", 0x1f, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:51 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) 22:23:51 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 22:23:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x9f, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:52 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010", 0x2e, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) signalfd4(r0, &(0x7f0000000000)={0x8}, 0x8, 0x800) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x4300, 0x0) recvmsg(r0, &(0x7f00000006c0)={&(0x7f0000000480)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000500)=""/55, 0x37}, {&(0x7f0000000540)}, {&(0x7f0000000580)=""/86, 0x56}], 0x3, &(0x7f0000000640)=""/95, 0x5f, 0xffffffff}, 0x40000000) bind$bt_hci(r2, &(0x7f0000000700)={0x1f, r3, 0x3}, 0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={r1, 0x9, 0x20, 0x1, 0x7}, &(0x7f0000000100)=0x18) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000780500004001000040010000500200004001000040010000a8040000a8040000a8040000a8040000a804000005000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800400100000000000000000000000000000000000000000000000030006c32747000000000000000000000000000000000000000000000000000000300000001000000020008000000000048004e45544d415000000000000000000000000000000000000000000000000000000000fe80000000000000000000000000001300000000000000000000ffff000000000700ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e595790a72d23aa9000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800534e4154000000000000000000000000000000000000000000000000000109000000fe8000000000000000000000000000bbfe8000000000000000000000000000bb4e244e240000000000000000000000000000000000000000000000000000000000000000000000909100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020014801000000000000000000000000000000000000000000000000300066726167000000000000000000000000000000000000000000000000000006000000000400000004000001030000280069636d7036000000000000000000000000000000000000000000000000000007050100000000280153455400000000000000000000000000000000000000000000000000000100003f0040000902fe8000000000000000000000000000bb00000000000000000000000000000000ffffff00ffffffffff0000ff000000ffff0000ff000000ff00000000ff000000000000007265746170300000000000006970366772653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000064000000000000000000000000000000003a00d70330000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048005245444952454354000000000000000000000000000000000000000000000c000000ac1414bb000000000000000000000000ffffffff000000000000000000000000050000680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000e4c56c90934bc77e1a50f93a4b562327cd30147b1a1311bb2146ed544cca29ff6b49c9d10f8bc3d5d216e8d3cd08d5cd6e311654a703b8fe484ef60871863b8429360fbec0f30c12fcd77968e4a2dc93ddf2c61825de5855bf3f6b8ba87e69d4562cccaa487ef8f45814b6564fe00cc202000a2e5534948cf21b003a7845bdf283553d1defd9fb52eb449cc194891c12a1afefe6264c7a6916cb762606ad0ba66945589c2c1b920504345ebe453dee4143164a6ca19ecd6ed3f31ce2929b2f359d21"], 0x5d8) 22:23:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:52 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) 22:23:52 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x84, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:52 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010", 0x2e, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x5, 0x4) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) splice(r1, &(0x7f0000000000), r1, &(0x7f0000000040), 0x0, 0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffff0000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={r1}, &(0x7f00000000c0)=0x794d65877ca26166) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x42000, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) bind$bt_sco(r3, &(0x7f0000000180)={0x1f, {0x80000000, 0xfff, 0x6, 0x3, 0x5, 0xeba8}}, 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000001c0)={0x2, [0xfffffffffffffff8, 0x6]}, 0x8) 22:23:52 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010", 0x2e, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:52 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) 22:23:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:52 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 22:23:52 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x5b, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:52 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x1a, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:52 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) 22:23:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:53 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb005265", 0x36, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) recvfrom$inet6(r0, &(0x7f0000000100)=""/245, 0xf5, 0x2000, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:53 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:53 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xe4, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:53 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:53 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb005265", 0x36, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:53 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200000000004, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000140)=0xb48a) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x3, 0x4) inotify_init() r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r3, 0x7}, &(0x7f00000001c0)=0x8) 22:23:53 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:53 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x24}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:53 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x43, 0x20, 0xffffffffffffff9c}, 0x2c) [ 813.446107] QAT: Invalid ioctl [ 813.477447] QAT: Invalid ioctl 22:23:53 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x7, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:53 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x20) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r2) 22:23:53 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb005265", 0x36, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 813.657981] Unknown ioctl -2147199776 22:23:54 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:54 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 813.690620] Unknown ioctl -2147199776 22:23:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xa8, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:54 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572", 0x3a, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:54 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:54 executing program 2: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x47f1, 0x5e) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f0000000080)={0x2}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x72, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x84000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:54 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572", 0x3a, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:54 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:54 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x0, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xfffffffffffffffc}, &(0x7f00000000c0)=0x8) 22:23:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x6b, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:54 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:54 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xb8, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:54 executing program 2: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x400}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e20, 0x172, @loopback, 0x1}}}, 0x84) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:54 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x0, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:54 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:54 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572", 0x3a, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r3, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) 22:23:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x8d, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:55 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x0, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:55 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb005265497345723346", 0x3c, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:55 executing program 2: r0 = socket$inet6(0xa, 0x7fffd, 0xd7) r1 = getpid() ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x8000) sched_setaffinity(r1, 0xfffffebe, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xfffffffffffffffc}, &(0x7f00000000c0)=0x8) 22:23:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:23:55 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x49, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f00000001c0)="8bdb6f160b9d192f75edb3485f6fa644ea5098549facfdc43731adb301524e1c6511c307745c49735f0f84bd84e118bde5b22b", &(0x7f0000001ffc), &(0x7f0000000040), &(0x7f0000000280)="5bcdcfb27ee7deb7b5c8c9bc0c83ed13c7ccab956d4f141b2984033855580d76c8e6c1bc3417f98c2491ad3b787b41071751fddf974ff79e3e390367eaccbf338a2559f42314b49a2297c657d0251dba8897b6aa54d8fd599f9eb192af01743112cc5ce4da27f45b71ec4c1a0def0a64ab2cc018f1fed12cbae1c843bfcd8a1e0838c2e60361006c314f828a") r3 = syz_open_dev$usbmon(&(0x7f0000000580)='/dev/usbmon#\x00', 0x9, 0x40000) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000600)={0x16, 0x21, 0x1, r4}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000003c0)=[@in6={0xa, 0x4e21, 0x3, @remote, 0xffffffffffffff4f}, @in={0x2, 0x4e24, @loopback}], 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f0000000340)}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ncpfs\x00', 0x4000, &(0x7f0000000480)="97f8cacd5c23c72093d49eaa6c54277e002f2f0c836a84cc8d634990f836b4ae409c7f964fcbe36f8156143ee6b2330556bc6c1d84bbd718b821ca0d3e56b5b4ab1c52e6c9eedb1c01d7316acd22cfe73b39ceb05921c17ba41a654a90cbf05628beefd5771b55ae3d2c37ceb3b0187a288084c16ab2d1f21d146574049944bc2beebd4401ae127d1fdcdd2f9691c96ada86f80b7b0cc15b5aacd5201f5de87977cc9577661817b595739e0c8541d66933a221ed418e98df58e3aa97829347219d63145ba7086be6670d31ceead53531abb5ef712381c1") read(r2, &(0x7f0000000400)=""/100, 0x64) 22:23:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r3, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) 22:23:55 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb005265497345723346", 0x3c, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x45, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:55 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:55 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:55 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r3, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) 22:23:55 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@mcast2}, &(0x7f0000000080)=0x14) 22:23:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r3, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) 22:23:55 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb005265497345723346", 0x3c, 0x10000}], 0x8000, &(0x7f0000013900)) 22:23:55 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xd6, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:55 executing program 4: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:55 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x4, @mcast2, 0xb2}}, 0xfffffffffffffffb, 0xb04b, 0x10001, 0x2, 0x4}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={r1}, &(0x7f00000000c0)=0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0xacb, {{0xa, 0x4e23, 0x1, @remote, 0x2}}, {{0xa, 0x4e24, 0x6, @empty, 0xbfb1}}}, 0x108) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='vmnet1'}, 0x10) bind$nfc_llcp(r2, &(0x7f0000000200)={0x27, 0x0, 0x2, 0x2, 0xffffffffffffffff, 0x7, "0c2025c4b89df6d8f2ed50fe1ed175ac85e8a27efe8e2234dba1118e5f3b2b8e3913e5890ffdecec9f05a5efab8ae905595d3568bb585fd1cb9e6d6d25dcc2", 0x13}, 0x60) 22:23:55 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:55 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r3, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) 22:23:56 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa0000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) write$P9_RGETLOCK(r0, &(0x7f0000000100)={0x56, 0x37, 0x2, {0x0, 0x3f, 0x4, r1, 0x38, "776c616e317b262f47504c2476626f786e657431dd5d7d5b656d306367726f757073656c665b2673656c696e757873797374656d65746830"}}, 0x56) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) socket$nl_generic(0x10, 0x3, 0x10) keyctl$link(0x8, 0x0, r2) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r3, &(0x7f0000000400)=""/100, 0x64) 22:23:56 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d}], 0x8000, &(0x7f0000013900)) 22:23:56 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:56 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x5d, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0xc133, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:56 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:56 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r3, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) 22:23:56 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:56 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x6c, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:56 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d}], 0x8000, &(0x7f0000013900)) 22:23:56 executing program 2: socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x600000, 0x0) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000040)=0x1, 0x4) 22:23:56 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:56 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:56 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc8070031") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:56 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 22:23:56 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d}], 0x8000, &(0x7f0000013900)) 22:23:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f00000000c0)=""/73, 0x7ff}) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:23:57 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x843, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000180)) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='\x00', 0xffffffffffffff9c}, 0x10) write$P9_RWALK(r1, &(0x7f0000000100)={0x16, 0x6f, 0x2, {0x1, [{0x0, 0x3, 0x3}]}}, 0x16) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000001c0)={'icmp6\x00'}, &(0x7f0000000200)=0x1e) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xc8, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:57 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000013900)) 22:23:57 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) 22:23:57 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) 22:23:57 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc8070031") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:57 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 816.995072] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:23:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x22, 0x20, 0xffffffffffffff9c}, 0x2c) [ 817.051398] REISERFS (device loop6): using ordered data mode [ 817.057341] reiserfs: using flush barriers 22:23:57 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) 22:23:57 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000001c0)=0x30) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x2bc, 0x2, 0x0, 0x2, 0xa}, &(0x7f0000000000)=0x98) [ 817.093289] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 817.104669] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:23:57 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:57 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) [ 817.144943] REISERFS warning (device loop6): sh-2022 reiserfs_fill_super: unable to initialize journal space 22:23:57 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc8070031") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:57 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000000)='nodev\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1, &(0x7f0000000240)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x8}}, {@version_L='version=9p2000.L'}, {@noextend='noextend'}, {@access_uid={'access', 0x3d, r2}}, {@debug={'debug', 0x3d, 0x3}}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@uname={'uname'}}]}}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={r1, 0xac, &(0x7f0000000300)=[@in={0x2, 0x4e21}, @in6={0xa, 0x4e24, 0x20, @empty, 0x200}, @in6={0xa, 0x4e21, 0x4, @loopback, 0x7}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e20, 0x5, @loopback, 0x5}, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x1a}, 0x7e00000}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0xed}]}, &(0x7f0000000400)=0x10) 22:23:57 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 22:23:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r0, &(0x7f0000000400)=""/100, 0x64) clock_getres(0x0, &(0x7f00000001c0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000070a0800310008000000000000008a93473bc33fc8ad18bc2d239092b2c56ba722ed49a547467e92b05600bd00000000000000000000000000000000394c9cac00000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) 22:23:58 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000013900)) 22:23:58 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xbb, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) dup2(r0, r0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:58 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) 22:23:58 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f8571") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:58 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:58 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) [ 817.944329] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:23:58 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xb0, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:58 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) [ 818.018306] REISERFS (device loop6): using ordered data mode [ 818.024609] reiserfs: using flush barriers 22:23:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) recvfrom$inet6(r0, &(0x7f0000000100)=""/130, 0x82, 0x2, &(0x7f0000000000)={0xa, 0x4e21, 0x5, @local, 0x657f}, 0x1c) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x204080, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) write$FUSE_LK(r2, &(0x7f0000000380)={0x28, 0x0, 0x2, {{0x6, 0x2e, 0x1, r3}}}, 0x28) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e22}}, [0x4c, 0x1, 0x0, 0x3c, 0x5, 0x80000000000000, 0x9, 0x4, 0x1, 0x8000, 0x10001, 0x1, 0x7, 0x5, 0x4]}, &(0x7f0000000080)=0x100) 22:23:58 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) 22:23:58 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 818.101770] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 818.113047] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:23:58 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x82, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:58 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f8571") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:58 executing program 2: r0 = dup(0xffffffffffffff9c) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) [ 818.265519] REISERFS warning (device loop6): sh-2022 reiserfs_fill_super: unable to initialize journal space 22:23:59 executing program 5: socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0xfffffffffffffffe, &(0x7f0000000000), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:23:59 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 22:23:59 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x79, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) 22:23:59 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000013900)) 22:23:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:59 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f8571") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x53, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:59 executing program 2: getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x7, 0x4, [0x20, 0x6, 0x7, 0x6]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={r0, 0x3f}, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in6={0xa, 0x4e23, 0x6, @remote, 0x100000000}}}, 0x90) [ 818.801736] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 818.823487] REISERFS (device loop6): using ordered data mode [ 818.829441] reiserfs: using flush barriers 22:23:59 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 818.899877] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 818.911167] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:23:59 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f857140") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) 22:23:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xe5, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r0, &(0x7f0000000400)=""/100, 0x64) clock_getres(0x0, &(0x7f00000001c0)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000070a0800310008000000000000008a93473bc33fc8ad18bc2d239092b2c56ba722ed49a547467e92b05600bd00000000000000000000000000000000394c9cac00000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) [ 818.959677] REISERFS warning (device loop6): sh-2022 reiserfs_fill_super: unable to initialize journal space 22:23:59 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x8010000000000088) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x480440) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000100), 0x4) 22:23:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) socket$inet6_sctp(0xa, 0x1, 0x84) read(r0, &(0x7f0000000000)=""/100, 0x64) 22:23:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x89, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:23:59 executing program 2: r0 = socket$inet6(0xa, 0x1006, 0x8010000000000090) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:23:59 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:59 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x96, 0x20, 0xffffffffffffff9c}, 0x2c) 22:23:59 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:23:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000340)={0x0, r1}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x70, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x13}, 0x80000001}, @in6={0xa, 0x4e22, 0x10000, @dev={0xfe, 0x80, [], 0x1}, 0xffffffff}, @in6={0xa, 0x4e24, 0xf66, @remote, 0x7fff}, @in6={0xa, 0x4e21, 0x6, @remote, 0x4}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r3, 0x7}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x8, 0x20}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0xfffffffffffff713, 0x8005, 0xa9, 0x5, r4}, 0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={r4, 0x7fffffff}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000), &(0x7f00000000c0)=0x8) umount2(&(0x7f0000000380)='./file0\x00', 0x8) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000003c0)) 22:23:59 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f857140") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:23:59 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:00 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:00 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000340)={0x0, r0}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x14, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:00 executing program 2: r0 = socket$inet6(0xa, 0xfffffffffffffffe, 0x8010000000000084) timer_create(0x2, &(0x7f0000000000)={0x0, 0x33, 0x1, @thr={&(0x7f0000000100)="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", &(0x7f0000001100)="3a19a4a3cdaca5fe90a7a4cc84dc615f5dc122b2d5e0b9aec218c8f41402ba3f6ca2e9d861cca71fd37f80d60db76eec48199a4b51daba052915ac2593be72dae292040d062724e9e7f1cecd38ff6d1410bacd0368e884f4df60fc5d623eda194344bb1230e969bfd28a8b8ca64544ea9c39b112"}}, &(0x7f0000000080)=0x0) timer_getoverrun(r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001180)='/dev/qat_adf_ctl\x00', 0x4400, 0x0) ioctl$sock_bt_hci(r2, 0x0, &(0x7f00000011c0)="45b37a9daf7d6f79234ae24fba79bb54f247d9661273658da4d91ab505412972f0d5c2340108ac20b4d4113236564e648b8b46add4d92abc4b53b3fc0a38c28dcb892e86ac512288bf6ba267adbc4fc3cf914fef57e4b40cee6c2c5d4e2f625b051db8859c28fa6461287591fd73ef96edbb1813e697ad4fe0d702deff7227b0d333cc4fc69318f9cfc321a90b8ddfbb7ac2c5f5c5") getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:24:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) socket$inet6_sctp(0xa, 0x1, 0x84) read(r0, &(0x7f0000000000)=""/100, 0x64) 22:24:00 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f857140") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:00 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xa6, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:00 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:00 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000001084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) fcntl$dupfd(r0, 0x0, r0) 22:24:00 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) process_vm_writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/22, 0x16}, {&(0x7f0000000280)=""/233, 0xe9}], 0x2, &(0x7f0000000640)=[{&(0x7f0000000100)=""/116, 0x74}, {&(0x7f00000001c0)=""/15, 0xf}, {&(0x7f0000000380)}, {&(0x7f0000000480)=""/140, 0x8c}, {&(0x7f0000000540)=""/245, 0xf5}], 0x5, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x7a, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:00 executing program 2: r0 = socket$inet6(0xa, 0xa, 0x20000000003) getsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r1, 0x3}, &(0x7f0000000080)=0x8) 22:24:00 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:00 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semget$private(0x0, 0x3, 0x4) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:00 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:00 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:00 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xf3, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:01 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:01 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:01 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000780)='.dead\x00', &(0x7f00000007c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000800)="a9d70815476f4d38ec7c6b2786ec0a974e82635f6d4a0dd4f8d94bd560276b9ccac4a070f960a1d7b1d66c549ba194af717c6d90c6cbec161945a356cd7a751e1169508e099666eb2d1fe3407ab5215eb41dbda182f96de5a1a684ad08eff44af32d8abd3ab229cfb971b804677edb39354eb952671d4f5005aa4c53d165340485af0dcaa5d69758173d1a38f507e35d070b08cc6ca5f914ac661dd5c645676a52495fccef652f4090c1d3d352efb60ec980f7ecb359d9cbe95534d5b7e9c3", 0xbf, 0xfffffffffffffff8) keyctl$instantiate(0xc, r1, &(0x7f00000008c0)="c9c3c2232f624a0b011df036e4c6e9f427eec484d1fdf12568795ded93df44b3d9ac3fa9ee592694efe60732982456a3057530ae5934d2c46f416bc03d59d4347edeaa30b7c91a6195549e37b83002cc2774d50931d5bebf18f272009bcff94f0490a5bf89a122da18ed34cdb78277278ad4f8c78c65108f0cee1553eea91d68205d525333a99fdb338ddb5ee4213c59cdaa2f1211d8362211be0785df8a6c0a5463a9ceabac8fa9fe1d60be01da1d849e3fafab1bbefdad13ebb3e59bd5be640a69d0d2818405da64a201a333fed484cd28c80a89d05dff49d023cc26c40625666ad3987785", 0xe6, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r2 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000100)='selinux\x00', 0xfffffffffffffffa) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x5, 0x101, 0x9, 0x100000001, 0x2, 0x3f, 0x6, 0x79, 0x38, 0xa0, 0x9, 0x5, 0x20, 0x1, 0x4, 0xcbb, 0x8}, [{0x70000007, 0x3, 0x9, 0x1f, 0x0, 0x400, 0xffff, 0x692a}, {0x2, 0xff70, 0x0, 0x40, 0x1, 0x8, 0xeb, 0x3}], "26ffc74be4158a969e607a6a1a", [[], [], [], []]}, 0x485) request_key(&(0x7f00000006c0)='id_legacy\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000740)='selinux\x00', 0x0) r3 = request_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) keyctl$instantiate(0xc, r2, 0x0, 0x0, r3) 22:24:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x77, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:01 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:01 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:01 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = userfaultfd(0x0) socket$unix(0x1, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xbd0, 0x2) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000040)) 22:24:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x8a, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) chmod(&(0x7f0000000000)='./file0\x00', 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:24:01 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) keyctl$link(0x8, 0x0, r1) r2 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000280)=""/193) r3 = userfaultfd(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$setsig(0x4203, r4, 0x3ff, &(0x7f0000000140)={0x35, 0x1, 0xffff, 0x1}) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) 22:24:01 executing program 6 (fault-call:0 fault-nth:0): syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:01 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:01 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:01 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 821.358076] FAULT_INJECTION: forcing a failure. [ 821.358076] name failslab, interval 1, probability 0, space 0, times 0 [ 821.369626] CPU: 0 PID: 11189 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 821.378129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.387612] Call Trace: [ 821.390201] dump_stack+0x1c9/0x2b4 [ 821.393864] ? dump_stack_print_info.cold.2+0x52/0x52 [ 821.399103] should_fail.cold.4+0xa/0x11 [ 821.403206] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 821.408360] ? lock_downgrade+0x8f0/0x8f0 [ 821.412553] ? proc_fail_nth_write+0x9e/0x210 [ 821.417099] ? proc_cwd_link+0x1d0/0x1d0 [ 821.421202] ? find_held_lock+0x36/0x1c0 [ 821.425319] ? check_same_owner+0x340/0x340 [ 821.429683] ? rcu_note_context_switch+0x680/0x680 [ 821.434643] __should_failslab+0x124/0x180 [ 821.438911] should_failslab+0x9/0x14 [ 821.442736] __kmalloc+0x2b2/0x720 [ 821.446301] ? strncpy_from_user+0x510/0x510 [ 821.450726] ? fput+0x130/0x1a0 [ 821.454018] ? do_syscall_64+0x9a/0x820 [ 821.458022] ? __x64_sys_memfd_create+0x142/0x4f0 [ 821.462915] ? do_syscall_64+0x9a/0x820 [ 821.466913] __x64_sys_memfd_create+0x142/0x4f0 [ 821.471614] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 821.477178] ? memfd_fcntl+0x1580/0x1580 [ 821.481360] ? ksys_ioctl+0x81/0xd0 [ 821.485020] do_syscall_64+0x1b9/0x820 [ 821.488950] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 821.494349] ? syscall_return_slowpath+0x5e0/0x5e0 [ 821.499326] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 821.504393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 821.509446] ? recalc_sigpending_tsk+0x180/0x180 [ 821.514243] ? kasan_check_write+0x14/0x20 [ 821.518515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.523402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.528658] RIP: 0033:0x457089 [ 821.531882] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 821.550813] RSP: 002b:00007f6fb480ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 22:24:01 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xe, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:01 executing program 4 (fault-call:1 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:01 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) [ 821.558552] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000457089 [ 821.565842] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004c23b2 [ 821.573128] RBP: 00000000009300a0 R08: 0000000020000098 R09: 00000000fbad8001 [ 821.580421] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 821.587715] R13: 00000000004d6be0 R14: 00000000004c9fad R15: 0000000000000000 22:24:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x6, 0x8000, 0x7, 0x2, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={r1, 0x8000000}, &(0x7f00000000c0)=0x8) ioctl$FICLONE(r0, 0x40049409, r0) 22:24:02 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x1e, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:02 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xc0802, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4, 0xa43, 0x5, 0xfffffffffffffc00, 0x96de, {0x0, @in6={{0xa, 0x4e24, 0x4, @empty, 0x7}}, 0x4, 0x4, 0x7b, 0x1, 0x3fc}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000001c0)={r4, 0x2, 0x1, 0x7}, &(0x7f0000000280)=0x10) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:24:02 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 22:24:02 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461782c0365", 0x0, &(0x7f0000de9000)) 22:24:02 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x6f, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:02 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:02 executing program 1: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:02 executing program 6 (fault-call:0 fault-nth:1): syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) [ 822.487769] FAULT_INJECTION: forcing a failure. [ 822.487769] name failslab, interval 1, probability 0, space 0, times 0 [ 822.499618] CPU: 1 PID: 11247 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 822.508140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.517517] Call Trace: [ 822.520135] dump_stack+0x1c9/0x2b4 [ 822.523789] ? dump_stack_print_info.cold.2+0x52/0x52 [ 822.529015] should_fail.cold.4+0xa/0x11 [ 822.533116] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 822.538248] ? find_held_lock+0x36/0x1c0 [ 822.542345] ? graph_lock+0x170/0x170 [ 822.546175] ? __lock_acquire+0x7fc/0x5020 [ 822.550423] ? lock_downgrade+0x8f0/0x8f0 [ 822.555129] ? find_held_lock+0x36/0x1c0 [ 822.559254] ? check_same_owner+0x340/0x340 [ 822.569023] ? rcu_note_context_switch+0x680/0x680 [ 822.573981] ? find_held_lock+0x36/0x1c0 [ 822.578077] __should_failslab+0x124/0x180 [ 822.582339] should_failslab+0x9/0x14 [ 822.586157] kmem_cache_alloc+0x29c/0x710 [ 822.590837] ? lock_downgrade+0x8f0/0x8f0 [ 822.595026] ? shmem_destroy_callback+0xc0/0xc0 [ 822.599724] shmem_alloc_inode+0x1b/0x40 [ 822.603802] alloc_inode+0x63/0x190 [ 822.607447] new_inode_pseudo+0x71/0x1a0 [ 822.611523] ? prune_icache_sb+0x1c0/0x1c0 [ 822.615779] ? _raw_spin_unlock+0x22/0x30 [ 822.619951] new_inode+0x1c/0x40 [ 822.623835] shmem_get_inode+0xf1/0x910 [ 822.627841] ? shmem_encode_fh+0x340/0x340 [ 822.632105] ? lock_downgrade+0x8f0/0x8f0 [ 822.636278] ? lock_release+0x9f0/0x9f0 [ 822.640305] ? check_same_owner+0x340/0x340 [ 822.644645] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 822.649677] ? __check_object_size+0xa3/0x5d7 [ 822.654205] __shmem_file_setup.part.45+0x83/0x2a0 [ 822.659183] shmem_file_setup+0x65/0x90 [ 822.663181] __x64_sys_memfd_create+0x2af/0x4f0 [ 822.667888] ? memfd_fcntl+0x1580/0x1580 [ 822.672066] ? ksys_ioctl+0x81/0xd0 [ 822.679906] do_syscall_64+0x1b9/0x820 [ 822.683947] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 822.689330] ? syscall_return_slowpath+0x5e0/0x5e0 [ 822.694277] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 822.699314] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 822.704341] ? recalc_sigpending_tsk+0x180/0x180 [ 822.709115] ? kasan_check_write+0x14/0x20 [ 822.713373] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.718241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.723444] RIP: 0033:0x457089 [ 822.726647] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.745564] RSP: 002b:00007f6fb480ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 822.753734] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000457089 [ 822.761015] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004c23b2 [ 822.768302] RBP: 00000000009300a0 R08: 0000000020000098 R09: 00000000fbad8001 [ 822.780343] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 22:24:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xe9, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461786e0365", 0x0, &(0x7f0000de9000)) [ 822.787625] R13: 00000000004d6be0 R14: 00000000004c9fad R15: 0000000000000001 22:24:03 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:03 executing program 2: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@rand_addr, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000240)={@remote, r1}, 0x14) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f00000002c0)) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:24:03 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xe8, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = userfaultfd(0x0) socket$unix(0x1, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xbd0, 0x2) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000040)) 22:24:03 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178030365", 0x0, &(0x7f0000de9000)) 22:24:03 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:04 executing program 5: utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x101, 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x42000, 0x0) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000300), &(0x7f0000000340)=0x4) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400, 0x0) listen(r3, 0x1) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000100)=""/100) read(r2, &(0x7f0000000000)=""/100, 0xffffffffffffffad) prctl$setfpexc(0xc, 0x3) 22:24:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x88, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:04 executing program 6 (fault-call:0 fault-nth:2): syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:04 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) setsockopt$inet_int(r1, 0x0, 0x32, &(0x7f0000000100)=0x4c3, 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:24:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178da0365", 0x0, &(0x7f0000de9000)) 22:24:04 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:04 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x25, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:04 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0xfffffffffffffe01, 0x40000) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000280)=0x8000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5, 0x1, 0x40, 0xc002, 0x7f}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r2, 0x16cf2386}, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e21, 0xe2b, @dev={0xfe, 0x80, [], 0xb}, 0x7}}, 0x1, 0x3, 0xffff, 0x0, 0xc}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) [ 823.830624] FAULT_INJECTION: forcing a failure. [ 823.830624] name failslab, interval 1, probability 0, space 0, times 0 [ 823.841966] CPU: 1 PID: 11311 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 823.850484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.859890] Call Trace: [ 823.862512] dump_stack+0x1c9/0x2b4 [ 823.866165] ? dump_stack_print_info.cold.2+0x52/0x52 [ 823.871910] should_fail.cold.4+0xa/0x11 22:24:04 executing program 1 (fault-call:1 fault-nth:0): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) [ 823.876013] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 823.887555] ? mark_held_locks+0x160/0x160 [ 823.891819] ? unwind_get_return_address+0x61/0xa0 [ 823.896811] ? find_held_lock+0x36/0x1c0 [ 823.900959] ? check_same_owner+0x340/0x340 [ 823.905319] ? rcu_note_context_switch+0x680/0x680 [ 823.910296] __should_failslab+0x124/0x180 [ 823.914568] should_failslab+0x9/0x14 [ 823.918404] kmem_cache_alloc+0x29c/0x710 [ 823.922650] ? mpol_shared_policy_init+0x235/0x670 [ 823.927615] ? current_time+0x72/0x1b0 [ 823.931528] __d_alloc+0xc8/0xd50 [ 823.935354] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 823.940833] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 823.946057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.951606] ? timespec64_trunc+0xea/0x180 [ 823.955850] ? inode_init_owner+0x340/0x340 [ 823.960202] ? _raw_spin_unlock+0x22/0x30 [ 823.964399] ? current_time+0x10b/0x1b0 [ 823.968424] ? __lockdep_init_map+0x105/0x590 [ 823.972928] d_alloc_pseudo+0x1d/0x30 [ 823.976780] alloc_file_pseudo+0x158/0x3f0 [ 823.981076] ? alloc_file+0x4d0/0x4d0 [ 823.984917] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 823.989936] ? __check_object_size+0xa3/0x5d7 [ 823.994434] ? kasan_check_write+0x14/0x20 [ 823.998671] __shmem_file_setup.part.45+0x110/0x2a0 [ 824.003691] shmem_file_setup+0x65/0x90 [ 824.007674] __x64_sys_memfd_create+0x2af/0x4f0 [ 824.012344] ? memfd_fcntl+0x1580/0x1580 [ 824.016422] ? ksys_ioctl+0x81/0xd0 [ 824.020086] do_syscall_64+0x1b9/0x820 [ 824.023991] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 824.029370] ? syscall_return_slowpath+0x5e0/0x5e0 [ 824.034481] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 824.039501] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 824.044547] ? recalc_sigpending_tsk+0x180/0x180 [ 824.049321] ? kasan_check_write+0x14/0x20 [ 824.053560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 824.058412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.063606] RIP: 0033:0x457089 22:24:04 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:04 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 824.066807] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 824.085714] RSP: 002b:00007f6fb480ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 824.093425] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000457089 [ 824.100694] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004c23b2 [ 824.107989] RBP: 00000000009300a0 R08: 0000000020000098 R09: 00000000fbad8001 [ 824.115321] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 824.122603] R13: 00000000004d6be0 R14: 00000000004c9fad R15: 0000000000000002 22:24:04 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461785f0365", 0x0, &(0x7f0000de9000)) [ 824.203775] FAULT_INJECTION: forcing a failure. [ 824.203775] name failslab, interval 1, probability 0, space 0, times 0 [ 824.215197] CPU: 1 PID: 11323 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 824.223721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.233807] Call Trace: [ 824.236434] dump_stack+0x1c9/0x2b4 [ 824.240098] ? dump_stack_print_info.cold.2+0x52/0x52 [ 824.245338] should_fail.cold.4+0xa/0x11 [ 824.250932] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 824.256109] ? lock_downgrade+0x8f0/0x8f0 [ 824.260305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 824.272982] ? proc_fail_nth_write+0x9e/0x210 [ 824.277531] ? find_held_lock+0x36/0x1c0 [ 824.281649] ? check_same_owner+0x340/0x340 [ 824.285998] ? __lock_is_held+0xb5/0x140 [ 824.290093] ? rcu_note_context_switch+0x680/0x680 [ 824.295075] __should_failslab+0x124/0x180 [ 824.299341] should_failslab+0x9/0x14 [ 824.303172] __kmalloc_track_caller+0x2ae/0x720 [ 824.307879] ? strncpy_from_user+0x510/0x510 [ 824.312312] ? strndup_user+0x77/0xd0 [ 824.316142] memdup_user+0x2c/0xa0 [ 824.319707] strndup_user+0x77/0xd0 [ 824.323369] ksys_mount+0x3c/0x140 [ 824.326941] __x64_sys_mount+0xbe/0x150 [ 824.330975] do_syscall_64+0x1b9/0x820 [ 824.334901] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 824.340300] ? syscall_return_slowpath+0x5e0/0x5e0 [ 824.345264] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 824.350764] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 824.355814] ? recalc_sigpending_tsk+0x180/0x180 [ 824.364061] ? kasan_check_write+0x14/0x20 [ 824.369873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 824.374768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.379984] RIP: 0033:0x457089 [ 824.383210] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:24:04 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 824.402136] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 824.409891] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 [ 824.417194] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 824.424912] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 824.432206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 824.439498] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000000 22:24:04 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000200)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=ANY=[@ANYRES32=r0]) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) sendto$inet(r1, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) r2 = socket$inet6(0xa, 0x3, 0x800000000000000c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x2a00) getsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:24:04 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x6e, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:05 executing program 6 (fault-call:0 fault-nth:3): syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461787fff65", 0x0, &(0x7f0000de9000)) 22:24:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) keyctl$negate(0xd, r1, 0x6, r1) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x2, 0x4) 22:24:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xa5, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:05 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x0, 0x0, 0x8}, 0xfffffffffffffc00, 0x3, 0x5}) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r1 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:05 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) r2 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e23, 0x3, @remote, 0x6}}, 0x0, 0x874, 0x1ff, 0x0, 0x6}, &(0x7f0000000040)=0x98) 22:24:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x8e, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:05 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178001465", 0x0, &(0x7f0000de9000)) 22:24:05 executing program 1 (fault-call:1 fault-nth:1): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:05 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @broadcast}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000000)=0xe8) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@rand_addr=0x9, 0x4e20, 0x0, 0x4e21, 0x401, 0x0, 0x20, 0x80, 0xff, r2, r3}, {0x7, 0xff, 0x3, 0x8, 0x10000, 0x6, 0xfffffffffffff523}, {0x7, 0x3, 0x5, 0x8}, 0x1f, 0x6e6bb0, 0x3, 0x1, 0x1, 0x2}, {{@in6, 0x4d4, 0xff}, 0x0, @in6=@mcast2, 0x3506, 0x6, 0x0, 0x6, 0x4, 0xffff, 0x5}}, 0xe8) 22:24:05 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x3d, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:05 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:05 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178100365", 0x0, &(0x7f0000de9000)) 22:24:05 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 825.034513] FAULT_INJECTION: forcing a failure. [ 825.034513] name failslab, interval 1, probability 0, space 0, times 0 [ 825.045816] CPU: 0 PID: 11381 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 825.054336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.063724] Call Trace: [ 825.066350] dump_stack+0x1c9/0x2b4 [ 825.070020] ? dump_stack_print_info.cold.2+0x52/0x52 [ 825.075267] should_fail.cold.4+0xa/0x11 [ 825.079375] ? fault_create_debugfs_attr+0x1f0/0x1f0 22:24:05 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 825.084522] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 825.089406] ? kmem_cache_alloc+0x12e/0x710 [ 825.093760] ? __d_alloc+0xc8/0xd50 [ 825.097435] ? lock_downgrade+0x8f0/0x8f0 [ 825.101632] ? find_held_lock+0x36/0x1c0 [ 825.105753] ? check_same_owner+0x340/0x340 [ 825.110108] ? lock_downgrade+0x8f0/0x8f0 [ 825.114301] ? rcu_note_context_switch+0x680/0x680 [ 825.119275] __should_failslab+0x124/0x180 [ 825.123563] should_failslab+0x9/0x14 [ 825.127412] kmem_cache_alloc+0x29c/0x710 [ 825.131601] ? kasan_check_write+0x14/0x20 [ 825.135850] __alloc_file+0xac/0x400 [ 825.139626] ? file_free_rcu+0x90/0x90 [ 825.143556] ? lock_downgrade+0x8f0/0x8f0 [ 825.147755] ? kasan_check_read+0x11/0x20 [ 825.151949] ? do_raw_spin_unlock+0xa7/0x2f0 [ 825.156389] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 825.160997] alloc_empty_file+0x72/0x170 [ 825.165097] alloc_file+0x5e/0x4d0 [ 825.168669] alloc_file_pseudo+0x261/0x3f0 [ 825.172938] ? alloc_file+0x4d0/0x4d0 [ 825.176773] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 825.181837] ? __check_object_size+0xa3/0x5d7 [ 825.186379] ? kasan_check_write+0x14/0x20 [ 825.190650] __shmem_file_setup.part.45+0x110/0x2a0 [ 825.195717] shmem_file_setup+0x65/0x90 [ 825.199731] __x64_sys_memfd_create+0x2af/0x4f0 [ 825.204433] ? memfd_fcntl+0x1580/0x1580 [ 825.208531] ? ksys_ioctl+0x81/0xd0 [ 825.212201] do_syscall_64+0x1b9/0x820 [ 825.216125] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 825.221520] ? syscall_return_slowpath+0x5e0/0x5e0 [ 825.226476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 825.232476] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 825.237528] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 825.242586] ? prepare_exit_to_usermode+0x291/0x3b0 [ 825.247637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 825.254542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.259757] RIP: 0033:0x457089 [ 825.262971] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 825.282702] RSP: 002b:00007f6fb480ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 825.290439] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000457089 [ 825.297737] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004c23b2 [ 825.305062] RBP: 00000000009300a0 R08: 0000000020000098 R09: 00000000fbad8001 [ 825.312378] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 825.319762] R13: 00000000004d6be0 R14: 00000000004c9fad R15: 0000000000000003 [ 825.357363] FAULT_INJECTION: forcing a failure. [ 825.357363] name failslab, interval 1, probability 0, space 0, times 0 [ 825.369007] CPU: 1 PID: 11402 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 825.377574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.387460] Call Trace: [ 825.390089] dump_stack+0x1c9/0x2b4 [ 825.393747] ? dump_stack_print_info.cold.2+0x52/0x52 [ 825.398963] ? __kernel_text_address+0xd/0x40 [ 825.403502] should_fail.cold.4+0xa/0x11 [ 825.407606] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 825.412753] ? save_stack+0x43/0xd0 [ 825.416431] ? kasan_kmalloc+0xc4/0xe0 [ 825.420361] ? __kmalloc_track_caller+0x14a/0x720 [ 825.425235] ? memdup_user+0x2c/0xa0 [ 825.428975] ? strndup_user+0x77/0xd0 [ 825.432805] ? graph_lock+0x170/0x170 [ 825.436641] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.442066] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 825.447650] ? proc_fail_nth_write+0x9e/0x210 [ 825.452193] ? find_held_lock+0x36/0x1c0 [ 825.461624] ? check_same_owner+0x340/0x340 [ 825.465979] ? lock_release+0x9f0/0x9f0 [ 825.469983] ? rcu_note_context_switch+0x680/0x680 [ 825.475437] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 825.480495] __should_failslab+0x124/0x180 [ 825.484766] should_failslab+0x9/0x14 [ 825.488602] __kmalloc_track_caller+0x2ae/0x720 [ 825.490378] FAULT_INJECTION: forcing a failure. [ 825.490378] name failslab, interval 1, probability 0, space 0, times 0 [ 825.493302] ? strncpy_from_user+0x510/0x510 [ 825.493336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 825.493356] ? strndup_user+0x77/0xd0 [ 825.493382] memdup_user+0x2c/0xa0 [ 825.493412] strndup_user+0x77/0xd0 [ 825.529895] ksys_mount+0x73/0x140 [ 825.533462] __x64_sys_mount+0xbe/0x150 [ 825.537459] do_syscall_64+0x1b9/0x820 [ 825.541364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 825.546752] ? syscall_return_slowpath+0x5e0/0x5e0 [ 825.552157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 825.557023] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 825.562078] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 825.567119] ? prepare_exit_to_usermode+0x291/0x3b0 [ 825.572172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 825.577057] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.582269] RIP: 0033:0x457089 [ 825.585480] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:24:05 executing program 6 (fault-call:0 fault-nth:4): syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:05 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 825.608765] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 825.616506] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 [ 825.623799] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 825.631089] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 825.638887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 825.646187] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000001 [ 825.653509] CPU: 0 PID: 11408 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 825.662049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.671433] Call Trace: [ 825.674074] dump_stack+0x1c9/0x2b4 [ 825.677745] ? dump_stack_print_info.cold.2+0x52/0x52 [ 825.682981] ? lock_downgrade+0x8f0/0x8f0 [ 825.687176] should_fail.cold.4+0xa/0x11 [ 825.691287] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 825.696442] ? is_bpf_text_address+0xd7/0x170 [ 825.700970] ? kernel_text_address+0x79/0xf0 [ 825.705422] ? __kernel_text_address+0xd/0x40 [ 825.709951] ? unwind_get_return_address+0x61/0xa0 [ 825.714918] ? find_held_lock+0x36/0x1c0 [ 825.719055] ? check_same_owner+0x340/0x340 [ 825.723419] ? rcu_note_context_switch+0x680/0x680 [ 825.728398] ? lock_downgrade+0x8f0/0x8f0 [ 825.732599] __should_failslab+0x124/0x180 [ 825.736880] should_failslab+0x9/0x14 [ 825.740723] kmem_cache_alloc_trace+0x2b5/0x730 [ 825.745430] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 825.750267] apparmor_file_alloc_security+0x162/0xa90 [ 825.755607] ? trace_hardirqs_on+0xbd/0x2c0 [ 825.759967] ? rcu_pm_notify+0xc0/0xc0 [ 825.764027] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 825.769883] ? rcu_read_lock_sched_held+0x108/0x120 [ 825.774930] ? kmem_cache_alloc+0x30b/0x710 [ 825.779283] ? kasan_check_write+0x14/0x20 [ 825.783562] security_file_alloc+0x4c/0xa0 [ 825.787833] __alloc_file+0xfc/0x400 [ 825.791580] ? file_free_rcu+0x90/0x90 [ 825.795505] ? lock_downgrade+0x8f0/0x8f0 [ 825.799760] ? kasan_check_read+0x11/0x20 [ 825.803947] ? do_raw_spin_unlock+0xa7/0x2f0 [ 825.808385] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 825.813001] alloc_empty_file+0x72/0x170 [ 825.817103] alloc_file+0x5e/0x4d0 [ 825.820671] alloc_file_pseudo+0x261/0x3f0 [ 825.824927] ? alloc_file+0x4d0/0x4d0 [ 825.828755] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 825.833814] ? __check_object_size+0xa3/0x5d7 [ 825.838349] ? kasan_check_write+0x14/0x20 [ 825.842626] __shmem_file_setup.part.45+0x110/0x2a0 [ 825.847670] shmem_file_setup+0x65/0x90 [ 825.851675] __x64_sys_memfd_create+0x2af/0x4f0 [ 825.856387] ? memfd_fcntl+0x1580/0x1580 [ 825.860477] ? ksys_ioctl+0x81/0xd0 [ 825.864141] do_syscall_64+0x1b9/0x820 [ 825.868064] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 825.873453] ? syscall_return_slowpath+0x5e0/0x5e0 [ 825.878405] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 825.883445] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 825.888478] ? recalc_sigpending_tsk+0x180/0x180 [ 825.893380] ? kasan_check_write+0x14/0x20 [ 825.897640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 825.902514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.907717] RIP: 0033:0x457089 [ 825.910934] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 825.929851] RSP: 002b:00007f6fb480ba88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 825.938085] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000457089 [ 825.945387] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004c23b2 [ 825.952699] RBP: 00000000009300a0 R08: 0000000020000098 R09: 00000000fbad8001 22:24:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x2, &(0x7f0000000280)="d55dfb90271342dfc7a543c0efe83a88f15627ba51ae72269e7068b50340df410c1c169c815193d9d576ddec744b7f67429156bc7764b7238bb391319ffef5ad7771946d000061c9db5d1341258dbbae511dee8b0fc47becaaa6410770f7c475087a33ed60c558faea1657ea41fbe4b30732487eca7a670bee1bcb69", &(0x7f0000000140), &(0x7f0000000000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:06 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:06 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x3b, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:06 executing program 2: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="ff0000abd3108e35c2ca194db1d35269"], 0x10) r1 = socket$inet6(0xa, 0x1, 0xa05000000000008a) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x400, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, r3, 0x30, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffff62}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1af}]}, 0x58}, 0x1, 0x0, 0x0, 0x8800}, 0x20000000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:24:06 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461784b0365", 0x0, &(0x7f0000de9000)) 22:24:06 executing program 0: socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:06 executing program 1 (fault-call:1 fault-nth:2): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) [ 825.959991] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 825.967279] R13: 00000000004d6be0 R14: 00000000004c9fad R15: 0000000000000004 [ 826.036446] FAULT_INJECTION: forcing a failure. [ 826.036446] name failslab, interval 1, probability 0, space 0, times 0 [ 826.048185] CPU: 0 PID: 11427 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 826.056708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.066081] Call Trace: [ 826.068695] dump_stack+0x1c9/0x2b4 [ 826.072352] ? dump_stack_print_info.cold.2+0x52/0x52 [ 826.077579] ? __kernel_text_address+0xd/0x40 22:24:06 executing program 0: socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:06 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:06 executing program 6 (fault-call:0 fault-nth:5): syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) [ 826.082102] ? unwind_get_return_address+0x61/0xa0 [ 826.087243] should_fail.cold.4+0xa/0x11 [ 826.091334] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 826.096483] ? save_stack+0xa9/0xd0 [ 826.100141] ? kasan_kmalloc+0xc4/0xe0 [ 826.104065] ? __kmalloc_track_caller+0x14a/0x720 [ 826.108940] ? memdup_user+0x2c/0xa0 [ 826.112683] ? strndup_user+0x77/0xd0 [ 826.116510] ? graph_lock+0x170/0x170 [ 826.120348] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 826.125926] ? proc_fail_nth_write+0x9e/0x210 [ 826.130460] ? find_held_lock+0x36/0x1c0 [ 826.134570] ? check_same_owner+0x340/0x340 [ 826.138920] ? lock_release+0x9f0/0x9f0 [ 826.142920] ? check_same_owner+0x340/0x340 [ 826.147271] ? rcu_note_context_switch+0x680/0x680 [ 826.152229] ? __check_object_size+0xa3/0x5d7 [ 826.156764] __should_failslab+0x124/0x180 [ 826.161031] should_failslab+0x9/0x14 [ 826.164871] kmem_cache_alloc_trace+0x2b5/0x730 [ 826.169577] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 826.175150] ? _copy_from_user+0xdf/0x150 [ 826.179318] copy_mount_options+0x5f/0x380 [ 826.183590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 826.189201] ksys_mount+0xd0/0x140 [ 826.192773] __x64_sys_mount+0xbe/0x150 [ 826.196780] do_syscall_64+0x1b9/0x820 [ 826.200708] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 826.206106] ? syscall_return_slowpath+0x5e0/0x5e0 [ 826.211076] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 826.216126] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 826.221171] ? recalc_sigpending_tsk+0x180/0x180 [ 826.225953] ? kasan_check_write+0x14/0x20 [ 826.230232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.235399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.240614] RIP: 0033:0x457089 [ 826.243833] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 826.257018] FAULT_INJECTION: forcing a failure. [ 826.257018] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 826.265308] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 826.265325] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 [ 826.265334] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 826.265342] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 826.265350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 826.265365] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000002 [ 826.324369] CPU: 1 PID: 11443 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 826.332887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.347629] Call Trace: [ 826.350245] dump_stack+0x1c9/0x2b4 [ 826.354027] ? dump_stack_print_info.cold.2+0x52/0x52 [ 826.359269] should_fail.cold.4+0xa/0x11 [ 826.363357] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 826.368495] ? graph_lock+0x170/0x170 [ 826.372317] ? find_held_lock+0x36/0x1c0 [ 826.376396] ? graph_lock+0x170/0x170 [ 826.380222] ? find_held_lock+0x36/0x1c0 [ 826.384298] ? __lock_is_held+0xb5/0x140 [ 826.388392] ? check_same_owner+0x340/0x340 [ 826.392746] ? find_get_entry+0x2e4/0xc90 [ 826.396912] ? rcu_note_context_switch+0x680/0x680 [ 826.402375] __alloc_pages_nodemask+0x365/0xd10 [ 826.407074] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 826.412137] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 826.417176] ? percpu_counter_add_batch+0xf2/0x150 [ 826.422131] ? mpol_shared_policy_lookup+0xf7/0x150 [ 826.427176] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 826.432737] alloc_pages_vma+0xdd/0x540 [ 826.436754] shmem_alloc_page+0xa8/0x190 [ 826.445975] ? shmem_swapin+0x230/0x230 [ 826.450007] shmem_alloc_and_acct_page+0x1f1/0x820 [ 826.454967] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 826.459654] ? find_held_lock+0x36/0x1c0 [ 826.463755] shmem_getpage_gfp+0x6ea/0x41e0 [ 826.468148] ? shmem_writepage+0x1380/0x1380 [ 826.472580] ? __lock_acquire+0x7fc/0x5020 [ 826.476827] ? print_usage_bug+0xc0/0xc0 [ 826.480914] ? print_usage_bug+0xc0/0xc0 [ 826.484993] ? print_usage_bug+0xc0/0xc0 [ 826.489075] ? print_usage_bug+0xc0/0xc0 [ 826.493159] ? print_usage_bug+0xc0/0xc0 [ 826.497233] ? check_noncircular+0x20/0x20 [ 826.501488] ? __lock_acquire+0x7fc/0x5020 [ 826.505745] ? __lock_acquire+0x7fc/0x5020 [ 826.510027] ? mark_held_locks+0x160/0x160 [ 826.514290] ? print_usage_bug+0xc0/0xc0 [ 826.521166] ? lock_downgrade+0x8f0/0x8f0 [ 826.526848] ? print_usage_bug+0xc0/0xc0 [ 826.530941] ? kasan_check_read+0x11/0x20 [ 826.535108] ? rcu_is_watching+0x8c/0x150 [ 826.539286] ? __lock_acquire+0x7fc/0x5020 [ 826.543543] ? __lock_acquire+0x7fc/0x5020 [ 826.547793] ? is_bpf_text_address+0xd7/0x170 [ 826.552311] ? __lock_acquire+0x7fc/0x5020 [ 826.556568] ? mark_held_locks+0x160/0x160 [ 826.560821] ? __lock_acquire+0x7fc/0x5020 [ 826.565078] ? graph_lock+0x170/0x170 [ 826.568900] ? print_usage_bug+0xc0/0xc0 [ 826.572982] ? find_held_lock+0x36/0x1c0 [ 826.581639] ? find_held_lock+0x36/0x1c0 [ 826.585732] ? mark_held_locks+0xc9/0x160 [ 826.589908] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 826.595118] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 826.600794] ? lockdep_hardirqs_on+0x421/0x5c0 [ 826.605394] ? trace_hardirqs_on+0xbd/0x2c0 [ 826.609728] ? kasan_check_write+0x14/0x20 [ 826.613982] ? current_time+0x72/0x1b0 [ 826.617892] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 826.623023] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 826.628599] ? iov_iter_fault_in_readable+0x23d/0x460 [ 826.633833] ? copy_page_from_iter+0x890/0x890 [ 826.638459] ? __sanitizer_cov_trace_pc+0x10/0x50 [ 826.643497] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 826.648714] shmem_write_begin+0x110/0x1e0 [ 826.653015] generic_perform_write+0x3ae/0x6c0 [ 826.657650] ? add_page_wait_queue+0x2c0/0x2c0 [ 826.662252] ? file_update_time+0xe4/0x640 [ 826.666510] ? current_time+0x1b0/0x1b0 [ 826.670514] ? down_write+0x8f/0x130 [ 826.674257] __generic_file_write_iter+0x26e/0x630 [ 826.679219] generic_file_write_iter+0x438/0x870 [ 826.684501] ? __generic_file_write_iter+0x630/0x630 [ 826.690113] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 826.695674] ? iov_iter_init+0xc9/0x1f0 [ 826.699693] __vfs_write+0x6af/0x9d0 [ 826.703436] ? kernel_read+0x120/0x120 [ 826.707360] ? __lock_is_held+0xb5/0x140 [ 826.711471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 826.717029] ? __sb_start_write+0x17f/0x300 [ 826.721399] vfs_write+0x1fc/0x560 [ 826.724975] ksys_pwrite64+0x181/0x1b0 [ 826.728890] ? __ia32_sys_pread64+0xf0/0xf0 [ 826.733233] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 826.738796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.744677] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 826.749801] ? do_sys_ftruncate+0x44e/0x560 [ 826.754151] __x64_sys_pwrite64+0x97/0xf0 [ 826.758323] do_syscall_64+0x1b9/0x820 [ 826.762231] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 826.767613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 826.772558] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 826.778057] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 826.783088] ? recalc_sigpending_tsk+0x180/0x180 [ 826.787875] ? kasan_check_write+0x14/0x20 [ 826.792131] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.797011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.802228] RIP: 0033:0x410e27 [ 826.805436] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 826.824868] RSP: 002b:00007f6fb480ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 826.832603] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000410e27 22:24:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xb1, 0x20, 0xffffffffffffff9c}, 0x2c) [ 826.839894] RDX: 000000000000003d RSI: 0000000020000240 RDI: 0000000000000004 [ 826.852410] RBP: 0000000000000000 R08: 0000000020000098 R09: 00000000fbad8001 [ 826.859700] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 826.866983] R13: 0000000000000001 R14: 00000000004c9fad R15: 0000000000000005 22:24:07 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:07 executing program 1 (fault-call:1 fault-nth:3): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461780a0365", 0x0, &(0x7f0000de9000)) 22:24:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x25e300, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x34cc, 0x1f, 0x9, 0x10, r1, 0x4}, 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x8, @mcast1, 0xc961}, @in6={0xa, 0x4e22, 0x8, @remote, 0x3}], 0x38) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="0800000008000300ff03ffff01000000ff240300"], 0x14) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200000, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x101001) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000940)={{0x7000, 0x2000, 0xa, 0x6, 0x7, 0x8, 0x0, 0x7, 0x100000000, 0x20, 0x9, 0x100}, {0x4, 0xeb4dc9d4f621839c, 0xe, 0x0, 0x9, 0x9, 0xf23, 0x1, 0x5, 0x800, 0x7, 0x3}, {0x5000, 0x7000, 0x8, 0x1, 0x4b, 0x431, 0x4, 0x4f, 0x2, 0x9, 0x4, 0x5}, {0x2000, 0x100004, 0xd, 0xbb, 0x1, 0x1fb907998000, 0x1, 0x9, 0x10001, 0xb3e, 0x1, 0x9}, {0x1002, 0x0, 0x84232474287d6bf9, 0xfffffffffffffffa, 0x1, 0x8001, 0xb51, 0xbdd, 0x0, 0x2ecc, 0x7, 0x1}, {0x4000, 0xd001, 0x0, 0x100000000, 0x24, 0xa5ce, 0x7, 0x1, 0xf87, 0x4, 0x20, 0x37f}, {0x1000, 0xd002, 0xd, 0x1, 0x4, 0x101, 0x2, 0x63789ab7, 0x8, 0x78c, 0xfff, 0x57}, {0xd000, 0xd000, 0xf, 0x3ff, 0x6, 0x289, 0xba, 0x2, 0x7fff, 0x9, 0x6, 0x2}, {0x100000}, {0x5000, 0x7000}, 0x1, 0x0, 0x5000, 0x0, 0x8, 0x4401, 0x4, [0x2, 0x5b18, 0xfffffffffffffbff, 0x473f]}) dup(r3) r4 = getuid() fstat(0xffffffffffffffff, &(0x7f00000000c0)) lchown(&(0x7f0000000340)='./file0\x00', r4, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000880)=""/171, &(0x7f00000002c0)=0xab) ioctl$KVM_GET_REG_LIST(r3, 0xc008aeb0, &(0x7f0000000380)=ANY=[@ANYBLOB="043f6060aebbcd558a5c48487b01d4d2ae568d9804c9fd31bb13ba40a97a6777d560e5f296200bc604375b9d12609393d89bb88a7440e5f080d6b479157679fd9da405aac0f71d7a6d2b08723210820757b6a76128f0ed96fcf20a7392250268"]) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0)}], 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 22:24:07 executing program 0: socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 827.114802] FAULT_INJECTION: forcing a failure. [ 827.114802] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 827.126680] CPU: 1 PID: 11467 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 827.135192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.144739] Call Trace: [ 827.147361] dump_stack+0x1c9/0x2b4 [ 827.151025] ? dump_stack_print_info.cold.2+0x52/0x52 [ 827.156283] should_fail.cold.4+0xa/0x11 [ 827.160394] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 827.165532] ? __lock_acquire+0x7fc/0x5020 [ 827.169795] ? lock_downgrade+0x8f0/0x8f0 [ 827.173986] ? mark_held_locks+0x160/0x160 [ 827.178271] ? mark_held_locks+0x160/0x160 [ 827.182557] ? is_bpf_text_address+0xd7/0x170 [ 827.187128] ? kernel_text_address+0x79/0xf0 [ 827.191595] ? __kernel_text_address+0xd/0x40 [ 827.196138] ? unwind_get_return_address+0x61/0xa0 [ 827.201120] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 827.206010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.211600] ? should_fail+0x246/0xd86 [ 827.215533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 827.220709] __alloc_pages_nodemask+0x365/0xd10 [ 827.225412] ? __kmalloc_track_caller+0x14a/0x720 [ 827.230880] ? memdup_user+0x2c/0xa0 [ 827.234634] ? strndup_user+0x77/0xd0 [ 827.238462] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 827.243503] ? proc_fail_nth_write+0x9e/0x210 [ 827.249518] ? find_held_lock+0x36/0x1c0 [ 827.253631] ? trace_hardirqs_off+0xb8/0x2b0 [ 827.258079] cache_grow_begin+0x91/0x710 [ 827.262178] kmem_cache_alloc_trace+0x653/0x730 [ 827.267339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 827.272918] copy_mount_options+0x5f/0x380 [ 827.277185] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 827.283447] ksys_mount+0xd0/0x140 [ 827.287018] __x64_sys_mount+0xbe/0x150 [ 827.291049] do_syscall_64+0x1b9/0x820 [ 827.294967] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 827.308930] ? syscall_return_slowpath+0x5e0/0x5e0 [ 827.313895] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 827.318943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 827.323979] ? recalc_sigpending_tsk+0x180/0x180 [ 827.329207] ? kasan_check_write+0x14/0x20 [ 827.333478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 827.338363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.343572] RIP: 0033:0x457089 [ 827.346783] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.365730] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 827.373931] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 [ 827.381221] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 827.388507] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 827.395791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 827.403082] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000003 22:24:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) r2 = getpgid(0x0) move_pages(r2, 0x3, &(0x7f0000000000)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil], 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x4) clone(0x900, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xfe, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:07 executing program 6 (fault-call:0 fault-nth:6): syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffad, 0x0) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) 22:24:07 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x1fd, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:07 executing program 1 (fault-call:1 fault-nth:4): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:07 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178020365", 0x0, &(0x7f0000de9000)) 22:24:07 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x8c, 0x20, 0xffffffffffffff9c}, 0x2c) [ 827.612128] FAULT_INJECTION: forcing a failure. [ 827.612128] name failslab, interval 1, probability 0, space 0, times 0 [ 827.623859] CPU: 0 PID: 11497 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 827.632377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.641755] Call Trace: [ 827.644377] dump_stack+0x1c9/0x2b4 [ 827.648044] ? dump_stack_print_info.cold.2+0x52/0x52 [ 827.653274] should_fail.cold.4+0xa/0x11 [ 827.657383] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 827.662535] ? print_usage_bug+0xc0/0xc0 [ 827.666635] ? __lock_acquire+0x7fc/0x5020 [ 827.670910] ? __lock_acquire+0x7fc/0x5020 [ 827.675175] ? mark_held_locks+0x160/0x160 [ 827.679444] ? __lock_acquire+0x7fc/0x5020 [ 827.683707] ? print_usage_bug+0xc0/0xc0 [ 827.687808] ? mark_held_locks+0x160/0x160 [ 827.692091] ? __lock_acquire+0x7fc/0x5020 [ 827.696373] ? print_usage_bug+0xc0/0xc0 [ 827.700488] ? __lock_acquire+0x7fc/0x5020 [ 827.704760] __should_failslab+0x124/0x180 [ 827.709020] should_failslab+0x9/0x14 [ 827.712885] kmem_cache_alloc+0x47/0x710 [ 827.716982] ? radix_tree_node_alloc.constprop.17+0x310/0x310 [ 827.722929] ? mark_held_locks+0x160/0x160 [ 827.727195] ? graph_lock+0x170/0x170 [ 827.731053] radix_tree_node_alloc.constprop.17+0x1e6/0x310 [ 827.736262] FAULT_INJECTION: forcing a failure. [ 827.736262] name failslab, interval 1, probability 0, space 0, times 0 [ 827.736804] __radix_tree_create+0x392/0x740 [ 827.752506] ? radix_tree_maybe_preload_order+0x110/0x110 [ 827.758074] ? __lock_acquire+0x7fc/0x5020 [ 827.762378] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 827.767249] ? mark_held_locks+0x160/0x160 [ 827.771497] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 827.776707] __radix_tree_insert+0x107/0x8f0 [ 827.781139] ? __radix_tree_create+0x740/0x740 [ 827.785745] ? lock_acquire+0x1e4/0x4f0 [ 827.789720] ? shmem_add_to_page_cache+0x49c/0xe00 [ 827.794657] ? lock_release+0x9f0/0x9f0 [ 827.798652] ? trace_hardirqs_off+0xb8/0x2b0 [ 827.803088] ? shmem_add_to_page_cache+0x49c/0xe00 [ 827.808029] ? trace_hardirqs_on+0x2c0/0x2c0 [ 827.812479] ? kasan_check_write+0x14/0x20 [ 827.816728] ? do_raw_spin_lock+0xc1/0x200 [ 827.820988] shmem_add_to_page_cache+0x988/0xe00 [ 827.825761] ? shmem_put_link+0x280/0x280 [ 827.829929] ? lock_downgrade+0x8f0/0x8f0 [ 827.834102] ? kasan_check_read+0x11/0x20 [ 827.838268] ? rcu_is_watching+0x8c/0x150 [ 827.842435] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 827.847131] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 827.852694] ? mem_cgroup_throttle_swaprate+0x2ef/0x888 [ 827.858195] ? swap_duplicate+0x80/0x80 [ 827.862202] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 827.866896] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 827.871937] ? __radix_tree_preload+0x173/0x1d0 [ 827.876641] shmem_getpage_gfp+0x81b/0x41e0 [ 827.881013] ? shmem_writepage+0x1380/0x1380 [ 827.885470] ? __lock_acquire+0x7fc/0x5020 [ 827.889727] ? print_usage_bug+0xc0/0xc0 [ 827.893820] ? print_usage_bug+0xc0/0xc0 [ 827.897913] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 827.902781] ? print_usage_bug+0xc0/0xc0 [ 827.906871] ? perf_trace_lock+0x920/0x920 [ 827.911130] ? print_usage_bug+0xc0/0xc0 [ 827.915218] ? check_noncircular+0x20/0x20 [ 827.919480] ? __lock_acquire+0x7fc/0x5020 [ 827.923738] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 827.928608] ? __lock_acquire+0x7fc/0x5020 [ 827.932883] ? mark_held_locks+0x160/0x160 [ 827.937752] ? print_usage_bug+0xc0/0xc0 [ 827.941834] ? lock_downgrade+0x8f0/0x8f0 [ 827.946009] ? print_usage_bug+0xc0/0xc0 [ 827.950100] ? kasan_check_read+0x11/0x20 [ 827.954270] ? rcu_is_watching+0x8c/0x150 [ 827.958445] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 827.963407] ? __lock_acquire+0x7fc/0x5020 [ 827.967690] ? perf_trace_lock+0x920/0x920 [ 827.971947] ? mark_held_locks+0x160/0x160 [ 827.976204] ? __lock_acquire+0x7fc/0x5020 [ 827.980461] ? graph_lock+0x170/0x170 [ 827.984302] ? print_usage_bug+0xc0/0xc0 [ 827.988401] ? find_held_lock+0x36/0x1c0 [ 827.992498] ? find_held_lock+0x36/0x1c0 [ 827.996593] ? mark_held_locks+0xc9/0x160 [ 828.000784] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 828.006006] ? ktime_get_coarse_real_ts64+0x288/0x3a0 [ 828.011233] ? lockdep_hardirqs_on+0x421/0x5c0 [ 828.015846] ? trace_hardirqs_on+0xbd/0x2c0 [ 828.020197] ? kasan_check_write+0x14/0x20 [ 828.024461] ? current_time+0x72/0x1b0 [ 828.028385] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 828.033524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.039096] ? iov_iter_fault_in_readable+0x23d/0x460 [ 828.044795] ? copy_page_from_iter+0x890/0x890 [ 828.049418] ? __sanitizer_cov_trace_pc+0x10/0x50 [ 828.054318] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 828.059536] shmem_write_begin+0x110/0x1e0 [ 828.063803] generic_perform_write+0x3ae/0x6c0 [ 828.068436] ? add_page_wait_queue+0x2c0/0x2c0 [ 828.073059] ? file_update_time+0xe4/0x640 [ 828.077328] ? current_time+0x1b0/0x1b0 [ 828.081349] ? down_write+0x8f/0x130 [ 828.085174] __generic_file_write_iter+0x26e/0x630 [ 828.090168] generic_file_write_iter+0x438/0x870 [ 828.094967] ? __generic_file_write_iter+0x630/0x630 [ 828.100106] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.105676] ? iov_iter_init+0xc9/0x1f0 [ 828.109681] __vfs_write+0x6af/0x9d0 [ 828.113433] ? kernel_read+0x120/0x120 [ 828.117362] ? __lock_is_held+0xb5/0x140 [ 828.121471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.127033] ? __sb_start_write+0x17f/0x300 [ 828.131409] vfs_write+0x1fc/0x560 [ 828.135085] ksys_pwrite64+0x181/0x1b0 [ 828.139001] ? __ia32_sys_pread64+0xf0/0xf0 [ 828.143349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 828.148914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.154295] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 828.159421] ? do_sys_ftruncate+0x44e/0x560 [ 828.163796] __x64_sys_pwrite64+0x97/0xf0 [ 828.167981] do_syscall_64+0x1b9/0x820 [ 828.171899] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 828.177299] ? syscall_return_slowpath+0x5e0/0x5e0 [ 828.182256] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 828.187304] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 828.192337] ? recalc_sigpending_tsk+0x180/0x180 [ 828.197120] ? kasan_check_write+0x14/0x20 [ 828.201396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.206271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.211481] RIP: 0033:0x410e27 [ 828.214674] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 828.235084] RSP: 002b:00007f6fb480ba80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 828.242821] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000410e27 [ 828.251282] RDX: 000000000000003d RSI: 0000000020000240 RDI: 0000000000000004 [ 828.258569] RBP: 0000000000000000 R08: 0000000020000098 R09: 00000000fbad8001 [ 828.265856] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 828.274049] R13: 0000000000000001 R14: 00000000004c9fad R15: 0000000000000006 [ 828.281367] CPU: 1 PID: 11504 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 828.290413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.304544] Call Trace: [ 828.307158] dump_stack+0x1c9/0x2b4 [ 828.310818] ? dump_stack_print_info.cold.2+0x52/0x52 [ 828.316073] should_fail.cold.4+0xa/0x11 [ 828.320172] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 828.325337] ? __switch_to_asm+0x40/0x70 [ 828.329430] ? __switch_to_asm+0x34/0x70 [ 828.333515] ? __switch_to_asm+0x40/0x70 [ 828.337606] ? __switch_to_asm+0x34/0x70 [ 828.341727] ? __switch_to_asm+0x40/0x70 [ 828.345820] ? __switch_to_asm+0x34/0x70 [ 828.356350] ? __switch_to_asm+0x34/0x70 [ 828.360913] ? __switch_to_asm+0x40/0x70 [ 828.365004] ? __switch_to_asm+0x40/0x70 [ 828.369101] ? __switch_to_asm+0x34/0x70 [ 828.373189] ? __switch_to_asm+0x40/0x70 [ 828.377784] ? __schedule+0x884/0x1df0 [ 828.381704] ? __sched_text_start+0x8/0x8 [ 828.385884] ? find_held_lock+0x36/0x1c0 [ 828.389993] ? check_same_owner+0x340/0x340 [ 828.394360] ? kmem_cache_alloc_trace+0x152/0x730 [ 828.399262] ? copy_mount_options+0x5f/0x380 [ 828.403698] ? ksys_mount+0xd0/0x140 [ 828.407446] __should_failslab+0x124/0x180 [ 828.411703] should_failslab+0x9/0x14 [ 828.415528] kmem_cache_alloc+0x29c/0x710 [ 828.419720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 828.424503] getname_flags+0xd0/0x5a0 [ 828.428321] ? trace_hardirqs_on_caller+0xc0/0x2b0 [ 828.433279] user_path_at_empty+0x2d/0x50 [ 828.437455] do_mount+0x17f/0x1e30 [ 828.441025] ? copy_mount_string+0x40/0x40 [ 828.445328] ? retint_kernel+0x10/0x10 [ 828.449254] ? copy_mount_options+0x1a1/0x380 [ 828.453773] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 828.458644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.470328] ? copy_mount_options+0x285/0x380 [ 828.474870] ksys_mount+0x12d/0x140 [ 828.478531] __x64_sys_mount+0xbe/0x150 [ 828.482553] do_syscall_64+0x1b9/0x820 [ 828.486467] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 828.491871] ? syscall_return_slowpath+0x5e0/0x5e0 [ 828.496830] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 828.501891] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 828.506935] ? recalc_sigpending_tsk+0x180/0x180 [ 828.511741] ? kasan_check_write+0x14/0x20 [ 828.516016] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.520938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.526151] RIP: 0033:0x457089 [ 828.529372] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.548297] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 828.556034] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 22:24:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={r1, 0x7}, &(0x7f0000000140)=0xffffffffffffff4d) 22:24:08 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:08 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:08 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:08 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xc7, 0x20, 0xffffffffffffff9c}, 0x2c) [ 828.563339] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 828.570652] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 828.577943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 828.585233] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000004 22:24:09 executing program 1 (fault-call:1 fault-nth:5): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00@e', 0x0, &(0x7f0000de9000)) 22:24:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xdf, 0x20, 0xffffffffffffff9c}, 0x2c) [ 828.752796] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 828.829627] FAULT_INJECTION: forcing a failure. [ 828.829627] name failslab, interval 1, probability 0, space 0, times 0 [ 828.840997] CPU: 0 PID: 11537 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 828.849532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.856021] REISERFS (device loop6): using ordered data mode [ 828.858916] Call Trace: [ 828.858936] dump_stack+0x1c9/0x2b4 [ 828.858950] ? dump_stack_print_info.cold.2+0x52/0x52 [ 828.858960] ? putname+0xf2/0x130 [ 828.858970] ? filename_lookup+0x397/0x510 [ 828.859002] ? perf_trace_lock+0xde/0x920 [ 828.859020] should_fail.cold.4+0xa/0x11 [ 828.859044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 828.859087] ? perf_trace_lock+0xde/0x920 [ 828.859102] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 828.859116] ? zap_class+0x740/0x740 [ 828.859129] ? perf_trace_lock+0x920/0x920 [ 828.859146] ? find_held_lock+0x36/0x1c0 [ 828.859187] ? check_same_owner+0x340/0x340 [ 828.859202] ? rcu_note_context_switch+0x680/0x680 [ 828.859219] __should_failslab+0x124/0x180 [ 828.859233] should_failslab+0x9/0x14 [ 828.859243] kmem_cache_alloc_trace+0x2b5/0x730 [ 828.859256] ? kasan_check_write+0x14/0x20 [ 828.859285] vfs_new_fs_context+0x5b/0x720 [ 828.859300] do_mount+0x605/0x1e30 [ 828.859309] ? rcu_is_watching+0x8c/0x150 [ 828.859318] ? trace_hardirqs_on+0xbd/0x2c0 [ 828.859332] ? copy_mount_string+0x40/0x40 22:24:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x40) fstatfs(r0, &(0x7f0000000280)=""/111) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f00000000c0)=""/68) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x21}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:24:09 executing program 2: prctl$getreaper(0x25, &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x8, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400801, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffb) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 22:24:09 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 828.859345] ? copy_mount_options+0x5f/0x380 [ 828.859362] ? kmem_cache_alloc_trace+0x324/0x730 [ 828.859394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.859407] ? _copy_from_user+0xdf/0x150 [ 828.859421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.859430] ? copy_mount_options+0x285/0x380 [ 828.859442] ksys_mount+0x12d/0x140 [ 828.859467] __x64_sys_mount+0xbe/0x150 [ 828.859483] do_syscall_64+0x1b9/0x820 [ 828.859496] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 828.859508] ? syscall_return_slowpath+0x5e0/0x5e0 [ 828.859519] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 828.859530] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 828.859538] ? recalc_sigpending_tsk+0x180/0x180 [ 828.859564] ? kasan_check_write+0x14/0x20 [ 828.859578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.859596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.859605] RIP: 0033:0x457089 [ 828.859619] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.859625] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 828.859640] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 [ 828.859662] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 828.859669] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 828.859675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 828.859682] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000005 [ 829.124421] reiserfs: using flush barriers [ 829.162304] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 829.174009] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:09 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:09 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x57, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:09 executing program 1 (fault-call:1 fault-nth:6): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:09 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00\ne', 0x0, &(0x7f0000de9000)) 22:24:09 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:09 executing program 2: r0 = socket$inet6(0xa, 0x20000001, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x4e24, @remote}}) pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000001c0)=""/4096) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0xcbc, 0x547, 0xd790, 'queue0\x00', 0x55}) 22:24:09 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 829.369949] FAULT_INJECTION: forcing a failure. [ 829.369949] name failslab, interval 1, probability 0, space 0, times 0 [ 829.381393] CPU: 0 PID: 11578 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 829.389909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.399292] Call Trace: [ 829.401913] dump_stack+0x1c9/0x2b4 [ 829.405571] ? dump_stack_print_info.cold.2+0x52/0x52 [ 829.410795] ? kernel_text_address+0x79/0xf0 [ 829.415248] should_fail.cold.4+0xa/0x11 [ 829.419345] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 829.424595] ? save_stack+0xa9/0xd0 [ 829.428247] ? save_stack+0x43/0xd0 [ 829.431899] ? kasan_kmalloc+0xc4/0xe0 [ 829.435817] ? vfs_new_fs_context+0x5b/0x720 [ 829.440250] ? do_mount+0x605/0x1e30 [ 829.443987] ? ksys_mount+0x12d/0x140 [ 829.447892] ? __x64_sys_mount+0xbe/0x150 [ 829.452072] ? do_syscall_64+0x1b9/0x820 [ 829.456159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.461567] ? find_held_lock+0x36/0x1c0 [ 829.465682] ? check_same_owner+0x340/0x340 [ 829.470031] ? debug_mutex_init+0x2d/0x60 [ 829.474223] ? rcu_note_context_switch+0x680/0x680 [ 829.479187] __should_failslab+0x124/0x180 [ 829.483450] should_failslab+0x9/0x14 [ 829.487272] kmem_cache_alloc_trace+0x2b5/0x730 [ 829.491965] ? rcu_read_lock_sched_held+0x108/0x120 [ 829.497016] ? put_fs_context+0x560/0x560 [ 829.501210] legacy_init_fs_context+0x49/0xd0 [ 829.505720] ? refcount_inc_checked+0x29/0x70 [ 829.510233] vfs_new_fs_context+0x2c6/0x720 [ 829.514598] do_mount+0x605/0x1e30 [ 829.518157] ? rcu_is_watching+0x8c/0x150 [ 829.522318] ? trace_hardirqs_on+0xbd/0x2c0 [ 829.526671] ? copy_mount_string+0x40/0x40 [ 829.530928] ? copy_mount_options+0x5f/0x380 [ 829.535458] ? kmem_cache_alloc_trace+0x324/0x730 [ 829.540326] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 829.545890] ? _copy_from_user+0xdf/0x150 [ 829.550071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 829.555625] ? copy_mount_options+0x285/0x380 [ 829.560148] ksys_mount+0x12d/0x140 [ 829.563796] __x64_sys_mount+0xbe/0x150 [ 829.567789] do_syscall_64+0x1b9/0x820 [ 829.571692] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 829.577078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 829.582021] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 829.587069] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 829.592099] ? recalc_sigpending_tsk+0x180/0x180 [ 829.596874] ? kasan_check_write+0x14/0x20 [ 829.601132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 829.606023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.611234] RIP: 0033:0x457089 [ 829.614438] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 829.633367] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 829.641095] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 [ 829.648391] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 829.655668] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 829.663125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 22:24:09 executing program 2 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000265", 0x0, &(0x7f0000de9000)) 22:24:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0xfffffffffffffffe) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) [ 829.670408] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000006 22:24:10 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x7d, 0x20, 0xffffffffffffff9c}, 0x2c) [ 829.714057] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:10 executing program 1 (fault-call:1 fault-nth:7): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) [ 829.755816] FAULT_INJECTION: forcing a failure. [ 829.755816] name failslab, interval 1, probability 0, space 0, times 0 [ 829.767215] CPU: 1 PID: 11595 Comm: syz-executor2 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 829.775733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.785201] Call Trace: [ 829.787826] dump_stack+0x1c9/0x2b4 [ 829.791506] ? dump_stack_print_info.cold.2+0x52/0x52 [ 829.796734] ? mark_held_locks+0x160/0x160 [ 829.801012] ? perf_trace_lock+0xde/0x920 [ 829.809566] should_fail.cold.4+0xa/0x11 [ 829.813664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 829.818804] ? zap_class+0x740/0x740 [ 829.822545] ? graph_lock+0x170/0x170 [ 829.826892] ? find_held_lock+0x36/0x1c0 [ 829.831025] ? check_same_owner+0x340/0x340 [ 829.835402] ? rcu_note_context_switch+0x680/0x680 [ 829.836181] FAULT_INJECTION: forcing a failure. [ 829.836181] name failslab, interval 1, probability 0, space 0, times 0 [ 829.840366] __should_failslab+0x124/0x180 [ 829.840391] should_failslab+0x9/0x14 [ 829.840407] __kmalloc+0x2b2/0x720 [ 829.840427] ? rcu_is_watching+0x8c/0x150 [ 829.840448] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 829.840472] ? rw_copy_check_uvector+0x361/0x3e0 [ 829.840503] rw_copy_check_uvector+0x361/0x3e0 [ 829.881401] import_iovec+0xcf/0x470 [ 829.885591] ? dup_iter+0x270/0x270 [ 829.889242] vfs_readv+0xf5/0x1c0 [ 829.892763] ? compat_rw_copy_check_uvector+0x440/0x440 [ 829.898149] ? __fget_light+0x2f7/0x440 [ 829.902142] ? fget_raw+0x20/0x20 [ 829.905626] ? __sb_end_write+0xac/0xe0 [ 829.909624] do_preadv+0x1cc/0x280 [ 829.913184] ? do_readv+0x310/0x310 [ 829.920282] ? __ia32_sys_read+0xb0/0xb0 [ 829.926409] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.931790] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 829.937163] __x64_sys_preadv+0x9a/0xf0 [ 829.941162] do_syscall_64+0x1b9/0x820 [ 829.945075] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 829.950918] ? syscall_return_slowpath+0x5e0/0x5e0 [ 829.955869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 829.960731] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 829.965763] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 829.970793] ? prepare_exit_to_usermode+0x291/0x3b0 [ 829.975829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 829.980702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.985903] RIP: 0033:0x457089 [ 829.989110] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.008029] RSP: 002b:00007fe7def49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 830.015771] RAX: ffffffffffffffda RBX: 00007fe7def4a6d4 RCX: 0000000000457089 [ 830.023074] RDX: 00000000000001d0 RSI: 00000000200017c0 RDI: 0000000000000004 [ 830.030352] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 830.037632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 830.045413] R13: 00000000004d3940 R14: 00000000004c85ba R15: 0000000000000000 [ 830.052721] CPU: 0 PID: 11600 Comm: syz-executor1 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 830.061238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.070605] Call Trace: [ 830.073213] dump_stack+0x1c9/0x2b4 [ 830.076868] ? dump_stack_print_info.cold.2+0x52/0x52 [ 830.082084] ? is_bpf_text_address+0xd7/0x170 [ 830.086605] ? perf_trace_lock+0xde/0x920 [ 830.090774] should_fail.cold.4+0xa/0x11 [ 830.094858] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 830.099989] ? save_stack+0xa9/0xd0 [ 830.103640] ? save_stack+0x43/0xd0 [ 830.107280] ? kasan_kmalloc+0xc4/0xe0 [ 830.111179] ? legacy_init_fs_context+0x49/0xd0 [ 830.115880] ? vfs_new_fs_context+0x2c6/0x720 [ 830.120459] ? do_mount+0x605/0x1e30 [ 830.124193] ? ksys_mount+0x12d/0x140 [ 830.127999] ? __x64_sys_mount+0xbe/0x150 [ 830.132177] ? find_held_lock+0x36/0x1c0 [ 830.136284] ? check_same_owner+0x340/0x340 [ 830.140622] ? rcu_note_context_switch+0x680/0x680 [ 830.145559] ? rcu_is_watching+0x8c/0x150 [ 830.149714] ? trace_hardirqs_on+0xbd/0x2c0 [ 830.154069] __should_failslab+0x124/0x180 [ 830.158349] should_failslab+0x9/0x14 [ 830.162165] kmem_cache_alloc_trace+0x2b5/0x730 [ 830.166854] ? legacy_init_fs_context+0x49/0xd0 [ 830.171538] ? rcu_read_lock_sched_held+0x108/0x120 [ 830.176567] ? kmem_cache_alloc_trace+0x324/0x730 [ 830.181434] ? rcu_read_lock_sched_held+0x108/0x120 [ 830.186470] apparmor_fs_context_alloc+0x43/0xa0 [ 830.191251] security_fs_context_alloc+0x54/0xb0 [ 830.196027] vfs_new_fs_context+0x318/0x720 [ 830.200387] do_mount+0x605/0x1e30 [ 830.203939] ? rcu_is_watching+0x8c/0x150 [ 830.208096] ? trace_hardirqs_on+0xbd/0x2c0 [ 830.212440] ? copy_mount_string+0x40/0x40 [ 830.216693] ? copy_mount_options+0x5f/0x380 [ 830.221119] ? kmem_cache_alloc_trace+0x324/0x730 [ 830.225993] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.233163] ? _copy_from_user+0xdf/0x150 [ 830.237337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 830.242896] ? copy_mount_options+0x285/0x380 [ 830.247709] ksys_mount+0x12d/0x140 [ 830.251365] __x64_sys_mount+0xbe/0x150 [ 830.255366] do_syscall_64+0x1b9/0x820 [ 830.259270] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 830.264648] ? syscall_return_slowpath+0x5e0/0x5e0 [ 830.271312] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 830.276343] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 830.281383] ? recalc_sigpending_tsk+0x180/0x180 [ 830.286777] ? kasan_check_write+0x14/0x20 [ 830.291077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.295949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.301147] RIP: 0033:0x457089 [ 830.304353] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.323452] RSP: 002b:00007f4371422c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 830.331174] RAX: ffffffffffffffda RBX: 00007f43714236d4 RCX: 0000000000457089 [ 830.338453] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 830.345749] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 830.353026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 830.360317] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000007 [ 830.367885] REISERFS (device loop6): using ordered data mode [ 830.373773] reiserfs: using flush barriers 22:24:10 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00\ne', 0x0, &(0x7f0000de9000)) [ 830.445832] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 830.457204] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:10 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x3, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:10 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x48, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:10 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='\neiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:10 executing program 2 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:10 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178001465", 0x0, &(0x7f0000de9000)) [ 830.715776] FAULT_INJECTION: forcing a failure. [ 830.715776] name failslab, interval 1, probability 0, space 0, times 0 [ 830.727281] CPU: 0 PID: 11631 Comm: syz-executor2 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 830.735805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.745180] Call Trace: [ 830.747807] dump_stack+0x1c9/0x2b4 [ 830.751476] ? dump_stack_print_info.cold.2+0x52/0x52 [ 830.756702] ? perf_trace_lock+0x49d/0x920 [ 830.760987] should_fail.cold.4+0xa/0x11 [ 830.765109] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 830.770250] ? seq_read+0x71/0x1150 [ 830.773924] ? mutex_trylock+0x2b0/0x2b0 [ 830.778019] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 830.782864] ? graph_lock+0x170/0x170 [ 830.786828] ? find_held_lock+0x36/0x1c0 [ 830.790960] ? __lock_is_held+0xb5/0x140 [ 830.795103] ? check_same_owner+0x340/0x340 [ 830.799470] ? rcu_note_context_switch+0x680/0x680 [ 830.804457] __should_failslab+0x124/0x180 [ 830.808750] should_failslab+0x9/0x14 [ 830.812589] kmem_cache_alloc_node_trace+0x259/0x720 [ 830.817729] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 830.822805] __kmalloc_node+0x33/0x70 [ 830.826641] kvmalloc_node+0x65/0xf0 [ 830.830405] seq_read+0x99b/0x1150 [ 830.834010] ? rw_verify_area+0x118/0x360 [ 830.838219] do_iter_read+0x49e/0x650 [ 830.842099] vfs_readv+0x175/0x1c0 [ 830.845695] ? compat_rw_copy_check_uvector+0x440/0x440 [ 830.851223] ? fget_raw+0x20/0x20 [ 830.854743] ? __sb_end_write+0xac/0xe0 [ 830.858782] do_preadv+0x1cc/0x280 [ 830.862381] ? do_readv+0x310/0x310 [ 830.866062] ? __ia32_sys_read+0xb0/0xb0 [ 830.870175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.875590] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 830.880756] __x64_sys_preadv+0x9a/0xf0 [ 830.884778] do_syscall_64+0x1b9/0x820 [ 830.888704] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 830.894104] ? syscall_return_slowpath+0x5e0/0x5e0 [ 830.899081] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 830.904133] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 830.909184] ? recalc_sigpending_tsk+0x180/0x180 [ 830.913974] ? kasan_check_write+0x14/0x20 [ 830.918253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.923150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.928381] RIP: 0033:0x457089 [ 830.931605] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.950725] RSP: 002b:00007fe7def49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 830.958577] RAX: ffffffffffffffda RBX: 00007fe7def4a6d4 RCX: 0000000000457089 22:24:11 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x4b, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffff8c, &(0x7f0000de9000)) 22:24:11 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 830.965891] RDX: 00000000000001d0 RSI: 00000000200017c0 RDI: 0000000000000004 [ 830.973198] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 830.980508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 830.987812] R13: 00000000004d3940 R14: 00000000004c85ba R15: 0000000000000001 22:24:11 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b000000, &(0x7f0000de9000)) 22:24:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) semget$private(0x0, 0x2, 0x430) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f00000000c0)=ANY=[@ANYBLOB="040000005f000000c90d000000000000010000000000000007000000000000000300000000000000ffffff7f0000000001000000010000000400004a41ac6dda0000000000090000"]) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:11 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='%eiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:11 executing program 2 (fault-call:4 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:11 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x3, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:11 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 831.274473] FAULT_INJECTION: forcing a failure. [ 831.274473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 831.286358] CPU: 1 PID: 11669 Comm: syz-executor2 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 831.294869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.308395] Call Trace: [ 831.311012] dump_stack+0x1c9/0x2b4 [ 831.314691] ? dump_stack_print_info.cold.2+0x52/0x52 [ 831.319910] ? perf_trace_lock+0xde/0x920 [ 831.324089] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 831.328971] should_fail.cold.4+0xa/0x11 [ 831.333235] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 831.338385] ? perf_trace_lock+0xde/0x920 [ 831.342559] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 831.347534] ? zap_class+0x740/0x740 [ 831.351275] ? perf_trace_lock+0x920/0x920 [ 831.355526] ? find_held_lock+0x36/0x1c0 [ 831.359616] ? graph_lock+0x170/0x170 [ 831.363445] ? lock_downgrade+0x8f0/0x8f0 [ 831.367647] __alloc_pages_nodemask+0x365/0xd10 [ 831.372342] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 831.377382] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 831.382097] ? __lock_is_held+0xb5/0x140 [ 831.386206] ? trace_hardirqs_off+0xb8/0x2b0 [ 831.390671] cache_grow_begin+0x91/0x710 [ 831.394769] kmem_cache_alloc_node_trace+0x64b/0x720 [ 831.401952] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 831.409124] __kmalloc_node+0x33/0x70 [ 831.412982] kvmalloc_node+0x65/0xf0 [ 831.416744] seq_read+0x99b/0x1150 [ 831.420321] ? rw_verify_area+0x118/0x360 [ 831.424493] do_iter_read+0x49e/0x650 [ 831.428330] vfs_readv+0x175/0x1c0 [ 831.431903] ? compat_rw_copy_check_uvector+0x440/0x440 [ 831.437827] ? fget_raw+0x20/0x20 [ 831.441325] ? __sb_end_write+0xac/0xe0 [ 831.445334] do_preadv+0x1cc/0x280 [ 831.448903] ? do_readv+0x310/0x310 [ 831.452547] ? __ia32_sys_read+0xb0/0xb0 [ 831.456628] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.462017] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 831.467164] __x64_sys_preadv+0x9a/0xf0 [ 831.471173] do_syscall_64+0x1b9/0x820 [ 831.475090] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 831.480479] ? syscall_return_slowpath+0x5e0/0x5e0 [ 831.485429] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 831.490469] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 831.495678] ? recalc_sigpending_tsk+0x180/0x180 [ 831.500458] ? kasan_check_write+0x14/0x20 [ 831.504716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 831.509588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.514791] RIP: 0033:0x457089 [ 831.518491] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.537502] RSP: 002b:00007fe7def49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 831.545264] RAX: ffffffffffffffda RBX: 00007fe7def4a6d4 RCX: 0000000000457089 [ 831.552550] RDX: 00000000000001d0 RSI: 00000000200017c0 RDI: 0000000000000004 [ 831.559838] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 831.567131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 22:24:11 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178001465", 0x0, &(0x7f0000de9000)) 22:24:11 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 831.574424] R13: 00000000004d3940 R14: 00000000004c85ba R15: 0000000000000002 22:24:12 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f, &(0x7f0000de9000)) 22:24:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xd2, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:12 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='r%iserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:12 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:12 executing program 2 (fault-call:4 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:12 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461787fff65", 0x0, &(0x7f0000de9000)) 22:24:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xe7, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:12 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x300000000000000, &(0x7f0000de9000)) 22:24:12 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:12 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:12 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461786e0365", 0x0, &(0x7f0000de9000)) 22:24:12 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='r\niserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xdb, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:12 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2a030000, &(0x7f0000de9000)) 22:24:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:12 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:12 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x8f, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2000000000000000, &(0x7f0000de9000)) 22:24:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178020365", 0x0, &(0x7f0000de9000)) 22:24:13 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rehserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:13 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:13 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x8a, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xd5, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) r3 = getpgrp(0xffffffffffffffff) r4 = gettid() kcmp(r3, r4, 0x5, r1, r0) keyctl$link(0x8, 0x0, r2) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r5, &(0x7f0000000400)=""/100, 0x64) 22:24:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461785f0365", 0x0, &(0x7f0000de9000)) 22:24:13 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rejserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x228, &(0x7f0000de9000)) 22:24:13 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:13 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x177, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xec, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:13 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x5a, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:13 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178da0365", 0x0, &(0x7f0000de9000)) 22:24:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x10f, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:13 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x100000000000000, &(0x7f0000de9000)) 22:24:13 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='re\nserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:14 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0), 0x0, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:14 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x16f, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xa, 0x8010000000000084) keyctl$link(0x8, 0x0, 0x0) pwritev(r0, &(0x7f0000000640)=[{&(0x7f0000000000)="3588594b0b662a1e2b6e463083850a204e0a473804a088e961e193fe5f5a13163610188d7afaa08a69ef746d4bb97bce6ffffd688dd0532eef0e592c95ca9352579f75ba1a2d42d82abe1b7a1aa484eaf97bfa888ae1c76c3ed112a41f102adce6402ccc58e58a3466bb6b0985fe485a053c6252eb2f5e4371cc", 0x7a}, {&(0x7f0000000140)="b8e04a7f5f1bdc522c8a3b4fde174a1bdea4ef32b2813efbb4b12ed46faa92", 0x1f}, {&(0x7f00000006c0)="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", 0x13c}, {&(0x7f0000000480)="7d81fb4de97bdb4c51c054ec0a1e587dcd1268e484b38989fcb43e7a74ff0a92e274820c94ff83ed9d12fb4b4892d9c1d824d8c96c2b5dd9193b750bd46ff6ebb33075b6142c89867bcc6967db7db8e1555c8044f63b51317e852a77fc2746c2d8f71ca96f0e492720eb940c63cb20b089fa8ebe549683b13949db10d0484848322ff3d699c5415fb92edf80e46d22c550def46cf0b0d1ac35b9e824fbb96a5eeaa83f9abf6e0a90a47b08ed1da97122bc1811551f680c896257d9b5c4f4b470aa4bdf7fe8c84aacffd01d2e6689d7aac211232a2277b05e", 0xd8}, {&(0x7f0000000100)="82bae1c5cf335fd7e3fbd395a19f2fe2bbc8919822e7cf8ad6c67f6ecc60433d52b6be6e69fceeb2737da2", 0x2b}, {&(0x7f0000000580)="80eccfe0cdb26d314aa210d352ed5e36f57994987eaa2699732252fc62607e3b136bc4207d4c87a42aa20c51694cc0cbdbd327476207b39c5ebf207edd06cf7e4909787fe6d8d58fafcbfeafd4d2f07eb611b71b477f26989686458e32c5343606e3ad5999218fe233503e3640c0915810b00d8a2856eeca5e9da57c3ea9946333264e7b3ddf02c43c3d950d11f384edf873fa156a157281bfbab2069cbfdc4162a80f3f6c1a", 0xa6}, {&(0x7f0000000380)="b72f536ae009d2edd6f8aae62a8c577aa1241ae06c5cfb8b18b01a663a77697b67103f588f4b5ace4caf3c44653f451037bb5801ee1114db53bb37e68154a1351597e27fbe4f521ef48261779a3cf9753d1885d70be2ae82ec28b7667a8c16f4811829958b2ff9fa46b4eeca33bc8581e4f398aaf1b63f3c38590807", 0x7c}], 0x7, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=0x0, &(0x7f0000000280)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000002c0)={0x0, 0x100, 0x8205, 0x1ff, 0x2, 0xea, 0x0, 0x100000001, r3}, &(0x7f0000000300)=0x20) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x35, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:14 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='re%serfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:14 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00\ne', 0x0, &(0x7f0000de9000)) 22:24:14 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda000000, &(0x7f0000de9000)) 22:24:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x17c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:14 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0), 0x0, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:14 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:14 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei*erfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:14 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa000000, &(0x7f0000de9000)) 22:24:14 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xb4, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:14 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461780a0365", 0x0, &(0x7f0000de9000)) 22:24:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x182, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:14 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:15 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0), 0x0, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xe2, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x2, 0x4) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:24:15 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiperfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:15 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b00, &(0x7f0000de9000)) 22:24:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461784b0365", 0x0, &(0x7f0000de9000)) 22:24:15 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)) 22:24:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x160, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x66, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:15 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:15 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x39, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x140, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:15 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178100365", 0x0, &(0x7f0000de9000)) 22:24:15 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reicerfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:15 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4000000000000, &(0x7f0000de9000)) 22:24:15 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:15 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)) 22:24:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178030365", 0x0, &(0x7f0000de9000)) 22:24:16 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffff1f0000000000, &(0x7f0000de9000)) 22:24:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x36, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x47, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:16 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket(0x3, 0x4, 0x4) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffb3, 0x1647, 0x3cc8, 0x80000000}, 0x6) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000000140)=0x81, 0x4) getsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000bfcffc), &(0x7f0000000100)=0x4) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:16 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei+erfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:16 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)) 22:24:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461782c0365", 0x0, &(0x7f0000de9000)) 22:24:16 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00@e', 0x0, &(0x7f0000de9000)) 22:24:16 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x1d, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:16 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei0erfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:16 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa003, &(0x7f0000de9000)) 22:24:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x5c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:16 executing program 3 (fault-call:21 fault-nth:0): request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:16 executing program 0 (fault-call:3 fault-nth:0): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x33, 0x20, 0xffffffffffffff9c}, 0x2c) [ 836.708607] FAULT_INJECTION: forcing a failure. [ 836.708607] name failslab, interval 1, probability 0, space 0, times 0 [ 836.719990] CPU: 1 PID: 12069 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 836.728517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.737903] Call Trace: [ 836.740523] dump_stack+0x1c9/0x2b4 [ 836.744181] ? dump_stack_print_info.cold.2+0x52/0x52 [ 836.755425] ? perf_trace_lock+0xde/0x920 [ 836.759616] should_fail.cold.4+0xa/0x11 [ 836.763718] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 836.768875] ? lock_downgrade+0x8f0/0x8f0 [ 836.773072] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 836.778673] ? proc_fail_nth_write+0x9e/0x210 [ 836.783204] ? find_held_lock+0x36/0x1c0 [ 836.787334] ? check_same_owner+0x340/0x340 [ 836.791689] ? rcu_note_context_switch+0x680/0x680 [ 836.796655] __should_failslab+0x124/0x180 [ 836.800933] should_failslab+0x9/0x14 [ 836.804760] __kmalloc_track_caller+0x2ae/0x720 [ 836.809468] ? strncpy_from_user+0x510/0x510 [ 836.813909] ? strndup_user+0x77/0xd0 [ 836.817752] memdup_user+0x2c/0xa0 [ 836.821326] strndup_user+0x77/0xd0 [ 836.824985] ksys_mount+0x3c/0x140 [ 836.828559] __x64_sys_mount+0xbe/0x150 [ 836.832569] do_syscall_64+0x1b9/0x820 [ 836.836490] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 836.841929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 836.846905] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 836.851963] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 836.857010] ? recalc_sigpending_tsk+0x180/0x180 [ 836.861803] ? kasan_check_write+0x14/0x20 [ 836.866086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 836.870972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.876179] RIP: 0033:0x457089 [ 836.879394] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:24:17 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei\nerfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000265", 0x0, &(0x7f0000de9000)) 22:24:17 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 836.898317] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 836.911601] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 836.918900] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 836.926201] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 836.933488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 836.940779] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000000 22:24:17 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8c01, &(0x7f0000de9000)) 22:24:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40401, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000040)) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) delete_module(&(0x7f00000000c0)='\\securitynodev\x00', 0x200) 22:24:17 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei-erfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x142, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:17 executing program 0 (fault-call:3 fault-nth:1): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xfc, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00\ne', 0x0, &(0x7f0000de9000)) 22:24:17 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffff9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:17 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa003000000000000, &(0x7f0000de9000)) 22:24:17 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiierfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:17 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x28020000, &(0x7f0000de9000)) 22:24:17 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x46, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178001465", 0x0, &(0x7f0000de9000)) 22:24:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x188, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:17 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8c9ec933e0001000000000000000000ff010000000000000000000000000001e0000001000000000000000000000000000025d02eb61fd6daff000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 837.615578] FAULT_INJECTION: forcing a failure. [ 837.615578] name failslab, interval 1, probability 0, space 0, times 0 [ 837.626959] CPU: 0 PID: 12122 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 837.635479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.644866] Call Trace: [ 837.647485] dump_stack+0x1c9/0x2b4 [ 837.651152] ? dump_stack_print_info.cold.2+0x52/0x52 [ 837.656389] ? __kernel_text_address+0xd/0x40 [ 837.660937] should_fail.cold.4+0xa/0x11 [ 837.665036] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 837.670197] ? save_stack+0x43/0xd0 [ 837.673875] ? kasan_kmalloc+0xc4/0xe0 [ 837.677794] ? __kmalloc_track_caller+0x14a/0x720 [ 837.682657] ? memdup_user+0x2c/0xa0 [ 837.686388] ? strndup_user+0x77/0xd0 [ 837.690320] ? graph_lock+0x170/0x170 [ 837.694154] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.699544] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 837.705109] ? proc_fail_nth_write+0x9e/0x210 [ 837.709641] ? find_held_lock+0x36/0x1c0 [ 837.713760] ? check_same_owner+0x340/0x340 [ 837.718103] ? lock_release+0x9f0/0x9f0 [ 837.722113] ? rcu_note_context_switch+0x680/0x680 [ 837.727084] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 837.732141] __should_failslab+0x124/0x180 [ 837.736413] should_failslab+0x9/0x14 [ 837.740240] __kmalloc_track_caller+0x2ae/0x720 [ 837.744945] ? strncpy_from_user+0x510/0x510 [ 837.749393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 837.754984] ? strndup_user+0x77/0xd0 [ 837.758815] memdup_user+0x2c/0xa0 [ 837.762388] strndup_user+0x77/0xd0 [ 837.766053] ksys_mount+0x73/0x140 [ 837.769645] __x64_sys_mount+0xbe/0x150 [ 837.773650] do_syscall_64+0x1b9/0x820 [ 837.777556] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 837.782943] ? syscall_return_slowpath+0x5e0/0x5e0 [ 837.787893] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 837.793018] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 837.798064] ? recalc_sigpending_tsk+0x180/0x180 [ 837.802842] ? kasan_check_write+0x14/0x20 [ 837.807106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 837.811983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.817206] RIP: 0033:0x457089 [ 837.820430] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 837.839366] RSP: 002b:00007f6da1302c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 837.847109] RAX: ffffffffffffffda RBX: 00007f6da13036d4 RCX: 0000000000457089 [ 837.854405] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 837.861697] RBP: 00000000009300a0 R08: 0000000020de9000 R09: 0000000000000000 [ 837.868986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 837.876274] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000001 22:24:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x11, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:18 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4, &(0x7f0000de9000)) 22:24:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:18 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f, &(0x7f0000de9000)) 22:24:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000002c0)='syz1\x00', r0) r1 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) userfaultfd(0x80800) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000006c0)={r2, 0x3f}, 0x8) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x2, 0x0, @local, 0x2000000000000007}, 0x334) write$UHID_CREATE(r1, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e00000010000000000002ebc00003e44000700000000000000009598000000c38622fc7555e4ca353b9c17ebc7cfb2fc4f012bc84bbb10d78dc98c6ba80ac1536d045bf3a15b76e658a1414a0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000006f37ceaa2447b6c53b85cf0198291a47e1140ce8eedcf378d2f5aff88f668cf3593373e76c935ebcc93fd50de417f7a89f5f2ed3c796a85785013918764f483845cd19d8c91c7c58651e2b3b393881210765856b18ca50109cb7cb258ef1e8"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:18 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reilerfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x50, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x55, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:18 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf6ffffff00000000, &(0x7f0000de9000)) 22:24:18 executing program 0 (fault-call:3 fault-nth:2): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 838.399872] FAULT_INJECTION: forcing a failure. [ 838.399872] name failslab, interval 1, probability 0, space 0, times 0 [ 838.411249] CPU: 1 PID: 12194 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 838.419869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.429242] Call Trace: [ 838.431853] dump_stack+0x1c9/0x2b4 [ 838.435517] ? dump_stack_print_info.cold.2+0x52/0x52 [ 838.440732] ? __kernel_text_address+0xd/0x40 [ 838.445256] ? unwind_get_return_address+0x61/0xa0 [ 838.450229] should_fail.cold.4+0xa/0x11 [ 838.454335] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 838.459468] ? save_stack+0xa9/0xd0 [ 838.463120] ? kasan_kmalloc+0xc4/0xe0 [ 838.467028] ? __kmalloc_track_caller+0x14a/0x720 [ 838.471910] ? memdup_user+0x2c/0xa0 [ 838.484822] ? strndup_user+0x77/0xd0 [ 838.488655] ? graph_lock+0x170/0x170 [ 838.492483] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 838.498064] ? proc_fail_nth_write+0x9e/0x210 [ 838.502590] ? find_held_lock+0x36/0x1c0 [ 838.506706] ? check_same_owner+0x340/0x340 [ 838.511066] ? lock_release+0x9f0/0x9f0 [ 838.515084] ? check_same_owner+0x340/0x340 [ 838.519799] ? rcu_note_context_switch+0x680/0x680 [ 838.524761] ? __check_object_size+0xa3/0x5d7 [ 838.529305] __should_failslab+0x124/0x180 [ 838.533574] should_failslab+0x9/0x14 [ 838.537410] kmem_cache_alloc_trace+0x2b5/0x730 [ 838.542125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.551950] ? _copy_from_user+0xdf/0x150 [ 838.556138] copy_mount_options+0x5f/0x380 [ 838.560410] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.565995] ksys_mount+0xd0/0x140 [ 838.569576] __x64_sys_mount+0xbe/0x150 [ 838.573585] do_syscall_64+0x1b9/0x820 [ 838.577499] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 838.582916] ? syscall_return_slowpath+0x5e0/0x5e0 [ 838.587889] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 838.592937] ? prepare_exit_to_usermode+0x3b0/0x3b0 22:24:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x102, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:18 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfffffffe, &(0x7f0000de9000)) 22:24:18 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0x92, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:18 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfffffff0, &(0x7f0000de9000)) [ 838.598504] ? recalc_sigpending_tsk+0x180/0x180 [ 838.603376] ? kasan_check_write+0x14/0x20 [ 838.607679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 838.612563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.617779] RIP: 0033:0x457089 [ 838.621004] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 838.639948] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 838.647726] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 838.655026] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 838.662327] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 838.669621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 838.676911] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000002 22:24:19 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000940)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x8, 0x0, r1}, &(0x7f0000000680)=0xffffffffffffff28) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r2, 0x3f}, 0x8) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:19 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiuerfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfeffffff00000000, &(0x7f0000de9000)) 22:24:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xae, 0x20, 0xffffffffffffff9c}, 0x2c) 22:24:19 executing program 0 (fault-call:3 fault-nth:3): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xb5, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:19 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa003000000000000, &(0x7f0000de9000)) 22:24:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x8, 0xffffffffffffff9c}, 0x2c) 22:24:19 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8001000000000000, &(0x7f0000de9000)) 22:24:19 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reixerfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="280000000400000000000000000000000500080000000000f8ffffffffffffff000000000000aecc"], 0x28) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r2) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000900)={0x2, 0x0, @local}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x3) r6 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r6) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, r2) timer_create(0x0, &(0x7f0000000500), &(0x7f0000000840)) timer_gettime(0x0, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r7) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r3, &(0x7f0000000400)=""/100, 0x64) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x5, 0x0, 0xff, 0x2, 0x4000000, 0x2, 0xffffffffffffa8c2}, 0x20) shmget(0x2, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) 22:24:19 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x200000000b2fe}, 0x1c) socket(0x11, 0x80000, 0x6) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 839.405627] FAULT_INJECTION: forcing a failure. [ 839.405627] name failslab, interval 1, probability 0, space 0, times 0 [ 839.416950] CPU: 0 PID: 12258 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 839.425466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.434840] Call Trace: [ 839.437462] dump_stack+0x1c9/0x2b4 [ 839.441124] ? dump_stack_print_info.cold.2+0x52/0x52 [ 839.446342] ? find_held_lock+0x36/0x1c0 [ 839.450453] should_fail.cold.4+0xa/0x11 [ 839.454551] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 839.459696] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 839.464478] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 839.469186] ? find_held_lock+0x36/0x1c0 [ 839.473309] ? check_same_owner+0x340/0x340 [ 839.477682] ? rcu_note_context_switch+0x680/0x680 [ 839.482721] ? copy_mount_options+0x5f/0x380 [ 839.487156] ? ksys_mount+0xd0/0x140 [ 839.490903] __should_failslab+0x124/0x180 [ 839.495177] should_failslab+0x9/0x14 [ 839.499009] kmem_cache_alloc+0x29c/0x710 [ 839.503191] ? find_held_lock+0x36/0x1c0 [ 839.507279] getname_flags+0xd0/0x5a0 [ 839.511114] user_path_at_empty+0x2d/0x50 [ 839.515303] do_mount+0x17f/0x1e30 [ 839.518861] ? rcu_is_watching+0x8c/0x150 [ 839.523028] ? trace_hardirqs_on+0xbd/0x2c0 [ 839.527419] ? copy_mount_string+0x40/0x40 [ 839.531680] ? copy_mount_options+0x5f/0x380 [ 839.536112] ? rcu_read_lock_sched_held+0x108/0x120 [ 839.541158] ? kmem_cache_alloc_trace+0x324/0x730 [ 839.546054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 839.551613] ? copy_mount_options+0x285/0x380 [ 839.556139] ksys_mount+0x12d/0x140 [ 839.559796] __x64_sys_mount+0xbe/0x150 [ 839.563838] do_syscall_64+0x1b9/0x820 [ 839.567759] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 839.573147] ? syscall_return_slowpath+0x5e0/0x5e0 [ 839.578106] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 839.583185] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 839.588218] ? recalc_sigpending_tsk+0x180/0x180 [ 839.592997] ? kasan_check_write+0x14/0x20 [ 839.597283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 839.602162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.607371] RIP: 0033:0x457089 [ 839.610574] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 839.629492] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 839.637226] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 839.644510] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 22:24:19 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x10, 0xffffffffffffff9c}, 0x2c) 22:24:20 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x36030000, &(0x7f0000de9000)) 22:24:20 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xedc0, &(0x7f0000de9000)) [ 839.651792] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 839.659084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 839.666377] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000003 22:24:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x7d, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:20 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei#erfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x41, 0xffffffffffffff9c}, 0x2c) 22:24:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x21, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:20 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa00, &(0x7f0000de9000)) 22:24:20 executing program 0 (fault-call:3 fault-nth:4): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:20 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x10000000, &(0x7f0000de9000)) 22:24:20 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x8}, 0x2c) 22:24:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x99, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 840.143798] FAULT_INJECTION: forcing a failure. [ 840.143798] name failslab, interval 1, probability 0, space 0, times 0 [ 840.161737] CPU: 1 PID: 12312 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 840.170260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.179625] Call Trace: [ 840.182233] dump_stack+0x1c9/0x2b4 [ 840.185887] ? dump_stack_print_info.cold.2+0x52/0x52 [ 840.191094] ? find_held_lock+0x36/0x1c0 [ 840.195188] should_fail.cold.4+0xa/0x11 [ 840.199269] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 840.204410] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 840.209553] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 840.214254] ? find_held_lock+0x36/0x1c0 [ 840.218375] ? check_same_owner+0x340/0x340 [ 840.224061] ? rcu_note_context_switch+0x680/0x680 [ 840.232850] ? copy_mount_options+0x5f/0x380 [ 840.237289] ? ksys_mount+0xd0/0x140 [ 840.241031] __should_failslab+0x124/0x180 [ 840.245303] should_failslab+0x9/0x14 [ 840.249127] kmem_cache_alloc+0x29c/0x710 [ 840.253312] getname_flags+0xd0/0x5a0 [ 840.259676] user_path_at_empty+0x2d/0x50 [ 840.263853] do_mount+0x17f/0x1e30 [ 840.267419] ? rcu_is_watching+0x8c/0x150 [ 840.271581] ? trace_hardirqs_on+0xbd/0x2c0 [ 840.281311] ? copy_mount_string+0x40/0x40 [ 840.285573] ? copy_mount_options+0x5f/0x380 [ 840.290006] ? rcu_read_lock_sched_held+0x108/0x120 [ 840.295071] ? kmem_cache_alloc_trace+0x324/0x730 [ 840.300416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.305987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.311543] ? copy_mount_options+0x285/0x380 [ 840.316074] ksys_mount+0x12d/0x140 [ 840.319724] __x64_sys_mount+0xbe/0x150 [ 840.323722] do_syscall_64+0x1b9/0x820 [ 840.327635] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 840.333033] ? syscall_return_slowpath+0x5e0/0x5e0 [ 840.337997] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 840.343048] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 840.351901] ? recalc_sigpending_tsk+0x180/0x180 [ 840.358110] ? kasan_check_write+0x14/0x20 [ 840.362378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 840.367248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.372454] RIP: 0033:0x457089 22:24:20 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e, &(0x7f0000de9000)) 22:24:20 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei%erfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) [ 840.375662] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 840.399510] RSP: 002b:00007f6da12c0c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 840.407672] RAX: ffffffffffffffda RBX: 00007f6da12c16d4 RCX: 0000000000457089 [ 840.414959] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 840.422753] RBP: 00000000009301e0 R08: 0000000020de9000 R09: 0000000000000000 [ 840.430053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 840.437349] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000004 22:24:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffffa, 0x2) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x5}, 0xb) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xfffffffffffffffe, &(0x7f00000000c0)="528582ac4b0ae482e2a0f02d3d000a192394dda12e3ba686a3d7070d247b7001a5da0a29f36724a0aa87f4c3eaf424699818a0c369732adfbfa546993e9af417dc8193aa41f248b65b5ee31ab94bca5d35cd43b4e5f2830cbe812fe19a61eaa5b8a255c6fc152b98d78a32bffdbffc057323c2d1aaed8480841b6556ff2c7441cce07ca5be7237e0a5524316c4a89b57f504251d00e2c6cd0584c6f8e3ad955f3617b523d7825503f037aaa59b5fc2d28923db2fe89671c006", &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000000)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:24:21 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8cffffff, &(0x7f0000de9000)) 22:24:21 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14, 0x80000) connect$packet(r0, &(0x7f00000003c0)={0x11, 0x17, r2, 0x1, 0x7}, 0x14) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000240)) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:21 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1000000000000000, &(0x7f0000de9000)) 22:24:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x5}, 0x2c) 22:24:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x48, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:21 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiXerfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:21 executing program 0 (fault-call:3 fault-nth:5): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 840.937982] FAULT_INJECTION: forcing a failure. [ 840.937982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 840.950372] CPU: 1 PID: 12366 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 840.958887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.968264] Call Trace: [ 840.970890] dump_stack+0x1c9/0x2b4 [ 840.974557] ? dump_stack_print_info.cold.2+0x52/0x52 [ 840.979786] ? mark_held_locks+0x160/0x160 [ 840.984070] should_fail.cold.4+0xa/0x11 [ 840.988166] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 840.993314] ? mark_held_locks+0x160/0x160 [ 840.997581] ? graph_lock+0x170/0x170 [ 841.001429] ? zap_class+0x740/0x740 [ 841.005169] ? print_usage_bug+0xc0/0xc0 [ 841.009275] ? find_held_lock+0x36/0x1c0 [ 841.013355] ? perf_trace_lock+0xde/0x920 [ 841.017515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.023065] ? should_fail+0x246/0xd86 [ 841.026963] ? zap_class+0x740/0x740 [ 841.030724] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.035851] __alloc_pages_nodemask+0x365/0xd10 [ 841.040554] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 841.045310] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 841.050354] ? find_held_lock+0x36/0x1c0 [ 841.054445] ? trace_hardirqs_off+0xb8/0x2b0 [ 841.058853] cache_grow_begin+0x91/0x710 [ 841.062925] kmem_cache_alloc+0x63a/0x710 [ 841.067094] getname_flags+0xd0/0x5a0 [ 841.070933] user_path_at_empty+0x2d/0x50 [ 841.075105] do_mount+0x17f/0x1e30 [ 841.078668] ? rcu_is_watching+0x8c/0x150 [ 841.082834] ? trace_hardirqs_on+0xbd/0x2c0 [ 841.087185] ? copy_mount_string+0x40/0x40 [ 841.091431] ? copy_mount_options+0x5f/0x380 [ 841.095884] ? rcu_read_lock_sched_held+0x108/0x120 [ 841.100906] ? kmem_cache_alloc_trace+0x324/0x730 [ 841.105775] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.111346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.117251] ? copy_mount_options+0x285/0x380 [ 841.121879] ksys_mount+0x12d/0x140 [ 841.125516] __x64_sys_mount+0xbe/0x150 [ 841.129499] do_syscall_64+0x1b9/0x820 [ 841.133398] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 841.138773] ? syscall_return_slowpath+0x5e0/0x5e0 [ 841.143709] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 841.148728] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 841.153875] ? recalc_sigpending_tsk+0x180/0x180 [ 841.158645] ? kasan_check_write+0x14/0x20 [ 841.162899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.167754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.172947] RIP: 0033:0x457089 [ 841.176144] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.195055] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 841.202766] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 841.210036] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 841.217707] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 841.224979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 841.232251] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000005 22:24:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x93, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:21 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x49010000, &(0x7f0000de9000)) 22:24:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x11}, 0x2c) 22:24:21 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x336, &(0x7f0000de9000)) 22:24:21 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reioerfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:21 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000006c0)={r0, 0x3f}, 0x8) r1 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r3 = socket$inet6(0xa, 0x1, 0x6) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) accept4$bt_l2cap(r3, &(0x7f0000000280), &(0x7f0000000380)=0xe, 0x800) syz_extract_tcp_res(&(0x7f00000003c0), 0x400, 0x7) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r5, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f0000000240)=0x5, 0x4) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000005c0)={0x1, 0x0, 0x80000000, 0x4, 0x91, 0x8f08, 0x5, 0x0, 0x2, 0x6}) r6 = msgget$private(0x0, 0x4) msgctl$IPC_STAT(r6, 0x2, &(0x7f0000000940)=""/210) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:21 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1300000000000000}, 0x2c) 22:24:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x79, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x20000) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x43eb, 0x1, 0x2000}, 0x4) r2 = userfaultfd(0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB]}}, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:24:22 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x18c, &(0x7f0000de9000)) 22:24:22 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3ca, &(0x7f0000de9000)) 22:24:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x6000000}, 0x2c) 22:24:22 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='rei.erfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:22 executing program 0 (fault-call:3 fault-nth:6): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1a8, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x3402}, 0x2c) 22:24:22 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xbd01, &(0x7f0000de9000)) 22:24:22 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8c01000000000000, &(0x7f0000de9000)) [ 841.876775] FAULT_INJECTION: forcing a failure. [ 841.876775] name failslab, interval 1, probability 0, space 0, times 0 [ 841.888192] CPU: 1 PID: 12425 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 841.896707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.906110] Call Trace: [ 841.906137] dump_stack+0x1c9/0x2b4 [ 841.906161] ? dump_stack_print_info.cold.2+0x52/0x52 [ 841.906188] ? perf_trace_lock+0xde/0x920 22:24:22 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiderfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:22 executing program 0 (fault-call:3 fault-nth:7): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 841.906218] should_fail.cold.4+0xa/0x11 22:24:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x19b, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 841.906246] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.906276] ? save_stack+0xa9/0xd0 [ 841.906297] ? save_stack+0x43/0xd0 [ 841.906313] ? kasan_kmalloc+0xc4/0xe0 [ 841.906332] ? vfs_new_fs_context+0x5b/0x720 22:24:22 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xcd02, &(0x7f0000de9000)) 22:24:22 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x12}, 0x2c) 22:24:22 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2000000, &(0x7f0000de9000)) [ 841.906347] ? do_mount+0x605/0x1e30 [ 841.906365] ? __x64_sys_mount+0xbe/0x150 [ 841.906890] ? do_syscall_64+0x1b9/0x820 [ 841.906914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.906938] ? find_held_lock+0x36/0x1c0 [ 841.906982] ? check_same_owner+0x340/0x340 [ 841.907001] ? debug_mutex_init+0x2d/0x60 [ 841.907021] ? rcu_note_context_switch+0x680/0x680 [ 841.907059] __should_failslab+0x124/0x180 [ 841.907082] should_failslab+0x9/0x14 [ 841.907099] kmem_cache_alloc_trace+0x2b5/0x730 [ 841.907121] ? rcu_read_lock_sched_held+0x108/0x120 [ 841.907147] ? put_fs_context+0x560/0x560 [ 841.907168] legacy_init_fs_context+0x49/0xd0 [ 841.907188] ? refcount_inc_checked+0x29/0x70 [ 841.907207] vfs_new_fs_context+0x2c6/0x720 [ 841.907231] do_mount+0x605/0x1e30 [ 841.907247] ? rcu_is_watching+0x8c/0x150 [ 841.907263] ? trace_hardirqs_on+0xbd/0x2c0 [ 841.907288] ? copy_mount_string+0x40/0x40 [ 841.907311] ? copy_mount_options+0x5f/0x380 [ 841.907332] ? kmem_cache_alloc_trace+0x324/0x730 [ 841.907360] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.907380] ? _copy_from_user+0xdf/0x150 [ 841.907407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.907425] ? copy_mount_options+0x285/0x380 [ 841.907449] ksys_mount+0x12d/0x140 [ 841.907469] __x64_sys_mount+0xbe/0x150 [ 841.907491] do_syscall_64+0x1b9/0x820 [ 841.907510] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 841.907533] ? syscall_return_slowpath+0x5e0/0x5e0 [ 841.907550] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 841.907569] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 841.907585] ? recalc_sigpending_tsk+0x180/0x180 [ 841.907602] ? kasan_check_write+0x14/0x20 [ 841.907625] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.907654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.907668] RIP: 0033:0x457089 [ 841.907688] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 841.907698] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 841.907718] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 841.907728] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 841.907737] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 841.907748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 841.907759] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000006 [ 842.199550] FAULT_INJECTION: forcing a failure. [ 842.199550] name failslab, interval 1, probability 0, space 0, times 0 [ 842.199575] CPU: 0 PID: 12456 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 842.199587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.199595] Call Trace: [ 842.199618] dump_stack+0x1c9/0x2b4 [ 842.199646] ? dump_stack_print_info.cold.2+0x52/0x52 [ 842.199671] ? perf_trace_lock+0xde/0x920 [ 842.199707] should_fail.cold.4+0xa/0x11 [ 842.199741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 842.199782] ? save_stack+0x43/0xd0 [ 842.199799] ? kasan_kmalloc+0xc4/0xe0 [ 842.199816] ? kmem_cache_alloc_trace+0x152/0x730 [ 842.199834] ? apparmor_fs_context_alloc+0x43/0xa0 [ 842.199857] ? find_held_lock+0x36/0x1c0 [ 842.199905] ? check_same_owner+0x340/0x340 [ 842.199924] ? kmem_cache_alloc_trace+0x275/0x730 [ 842.199946] ? rcu_note_context_switch+0x680/0x680 [ 842.199964] ? kasan_check_read+0x11/0x20 [ 842.199991] __should_failslab+0x124/0x180 [ 842.200013] should_failslab+0x9/0x14 [ 842.200031] __kmalloc_track_caller+0x2ae/0x720 [ 842.200062] ? m_show+0x5d0/0x5d0 [ 842.200086] ? rcu_read_lock_sched_held+0x108/0x120 [ 842.200104] ? kmem_cache_alloc_trace+0x324/0x730 [ 842.200121] ? vfs_parse_fs_string+0x191/0x2b0 [ 842.200146] kmemdup_nul+0x31/0xa0 [ 842.200167] vfs_parse_fs_string+0x191/0x2b0 [ 842.200189] ? vfs_parse_fs_param+0x2c0/0x2c0 [ 842.200212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.200239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.200268] do_mount+0x658/0x1e30 [ 842.200284] ? rcu_is_watching+0x8c/0x150 [ 842.200300] ? trace_hardirqs_on+0xbd/0x2c0 [ 842.200323] ? copy_mount_string+0x40/0x40 [ 842.200346] ? copy_mount_options+0x5f/0x380 [ 842.200376] ? kmem_cache_alloc_trace+0x324/0x730 [ 842.200411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.200430] ? copy_mount_options+0x285/0x380 [ 842.200453] ksys_mount+0x12d/0x140 [ 842.200474] __x64_sys_mount+0xbe/0x150 [ 842.200497] do_syscall_64+0x1b9/0x820 [ 842.200518] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 842.200540] ? syscall_return_slowpath+0x5e0/0x5e0 [ 842.200560] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 842.200580] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 842.200597] ? recalc_sigpending_tsk+0x180/0x180 [ 842.200614] ? kasan_check_write+0x14/0x20 [ 842.200639] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 842.200666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.200679] RIP: 0033:0x457089 [ 842.200699] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 842.200710] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 842.200729] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 842.200741] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 842.200752] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 22:24:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0xffffffffffffff9f, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x4, 0x4) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x10) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:24:23 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reis\nrfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:23 executing program 0 (fault-call:3 fault-nth:8): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x4}, 0x2c) 22:24:23 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000fe58b62de1efa32f32a6ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000900000000000000000000000f40f8c5f4942eb2000000000000000000000000000000000000000000000000000054ea6eac05c155a285db17164f08f049261d81fe70a271cbe5"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0x4a196535, 0x7, 0x3f, 0x7ff, 0x6}, 0x14) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1af, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:23 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfeffffff, &(0x7f0000de9000)) 22:24:23 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f000000, &(0x7f0000de9000)) [ 842.200763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 842.200773] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000007 [ 843.208071] FAULT_INJECTION: forcing a failure. [ 843.208071] name failslab, interval 1, probability 0, space 0, times 0 [ 843.219428] CPU: 0 PID: 12511 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 843.227940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.237310] Call Trace: [ 843.239920] dump_stack+0x1c9/0x2b4 [ 843.243576] ? dump_stack_print_info.cold.2+0x52/0x52 [ 843.248790] ? perf_trace_lock+0xde/0x920 [ 843.252970] should_fail.cold.4+0xa/0x11 [ 843.258516] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 843.263656] ? save_stack+0x43/0xd0 [ 843.267300] ? kasan_kmalloc+0xc4/0xe0 [ 843.271204] ? kmem_cache_alloc_trace+0x152/0x730 [ 843.277580] ? apparmor_fs_context_alloc+0x43/0xa0 [ 843.282556] ? security_fs_context_alloc+0x54/0xb0 [ 843.287511] ? find_held_lock+0x36/0x1c0 [ 843.292545] ? check_same_owner+0x340/0x340 [ 843.296934] ? kmem_cache_alloc_trace+0x275/0x730 [ 843.301800] ? rcu_note_context_switch+0x680/0x680 [ 843.306745] ? kasan_check_read+0x11/0x20 [ 843.310931] __should_failslab+0x124/0x180 [ 843.315193] should_failslab+0x9/0x14 [ 843.319013] __kmalloc_track_caller+0x2ae/0x720 [ 843.323710] ? m_show+0x5d0/0x5d0 [ 843.327189] ? rcu_read_lock_sched_held+0x108/0x120 [ 843.332224] ? kmem_cache_alloc_trace+0x324/0x730 [ 843.337102] ? vfs_parse_fs_string+0x191/0x2b0 [ 843.341750] kmemdup_nul+0x31/0xa0 [ 843.345314] vfs_parse_fs_string+0x191/0x2b0 [ 843.349886] ? vfs_parse_fs_param+0x2c0/0x2c0 [ 843.354404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.359966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.365534] do_mount+0x658/0x1e30 [ 843.369092] ? rcu_is_watching+0x8c/0x150 [ 843.373257] ? trace_hardirqs_on+0xbd/0x2c0 [ 843.377602] ? copy_mount_string+0x40/0x40 [ 843.381874] ? copy_mount_options+0x5f/0x380 [ 843.386299] ? kmem_cache_alloc_trace+0x324/0x730 [ 843.391180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.396851] ? copy_mount_options+0x285/0x380 [ 843.401377] ksys_mount+0x12d/0x140 [ 843.405021] __x64_sys_mount+0xbe/0x150 [ 843.409023] do_syscall_64+0x1b9/0x820 [ 843.412937] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 843.418322] ? syscall_return_slowpath+0x5e0/0x5e0 [ 843.423281] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 843.428315] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 843.433348] ? recalc_sigpending_tsk+0x180/0x180 [ 843.438131] ? kasan_check_write+0x14/0x20 [ 843.442399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 843.447267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.452465] RIP: 0033:0x457089 [ 843.455670] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 843.474587] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 843.482315] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 843.489598] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 843.496881] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 22:24:23 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1000000000000000, &(0x7f0000de9000)) 22:24:23 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000a3cfd9b6d6649d38e97b801cd8c8aea3ded246cf991987fec709682a3820b6922754329619c38bb9ccb41ec19a223741383b2ece22dc94036fbffd24bf23beca96056ab5e2281a6a5b3cc25b2c8ab59def748a600f6d0833ef0c490a26634729e090a0fc44e3c4dac4094aa5ab0321d228a0c5a68c4a1816f3e5066ae0de8d7bbe8e0368f65556fc956a8ef7c33f5c7b2bf9bd8263ef6229e477293048e0ff0f52d76a73d04b8836c6c56b22", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:23 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x400000000000000}, 0x2c) [ 843.504167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 843.511457] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000008 22:24:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x174, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:23 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2cd, &(0x7f0000de9000)) 22:24:24 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reis%rfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:24 executing program 0 (fault-call:3 fault-nth:9): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1100000000000000}, 0x2c) [ 843.856282] FAULT_INJECTION: forcing a failure. [ 843.856282] name failslab, interval 1, probability 0, space 0, times 0 [ 843.867628] CPU: 0 PID: 12546 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 843.876124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.885489] Call Trace: [ 843.888135] dump_stack+0x1c9/0x2b4 [ 843.891778] ? dump_stack_print_info.cold.2+0x52/0x52 [ 843.896978] ? rcu_is_watching+0x8c/0x150 [ 843.901154] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 843.905856] should_fail.cold.4+0xa/0x11 [ 843.909952] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 843.915088] ? kernel_text_address+0x79/0xf0 [ 843.919524] ? unwind_get_return_address+0x61/0xa0 [ 843.924483] ? __save_stack_trace+0x8d/0xf0 [ 843.928844] ? find_held_lock+0x36/0x1c0 [ 843.932964] ? check_same_owner+0x340/0x340 [ 843.937849] ? rcu_note_context_switch+0x680/0x680 [ 843.942821] __should_failslab+0x124/0x180 [ 843.947094] should_failslab+0x9/0x14 [ 843.950926] __kmalloc_track_caller+0x2ae/0x720 [ 843.955626] ? kasan_check_read+0x11/0x20 [ 843.959796] ? rcu_is_watching+0x8c/0x150 [ 843.963964] ? trace_hardirqs_on+0xbd/0x2c0 [ 843.968309] ? rcu_pm_notify+0xc0/0xc0 [ 843.972221] ? apparmor_fs_context_parse_param+0x1dd/0x490 [ 843.977872] krealloc+0x65/0xb0 [ 843.981183] apparmor_fs_context_parse_param+0x1dd/0x490 [ 843.986672] security_fs_context_parse_param+0x54/0xb0 [ 843.991974] vfs_parse_fs_param+0x127/0x2c0 [ 843.996320] vfs_parse_fs_string+0x1d5/0x2b0 [ 844.000742] ? vfs_parse_fs_param+0x2c0/0x2c0 [ 844.005255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.010830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.016408] do_mount+0x658/0x1e30 [ 844.019987] ? copy_mount_string+0x40/0x40 [ 844.024253] ? retint_kernel+0x10/0x10 [ 844.028178] ? copy_mount_options+0x1e3/0x380 [ 844.032701] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 844.037577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.043512] ? copy_mount_options+0x285/0x380 [ 844.048034] ksys_mount+0x12d/0x140 [ 844.051699] __x64_sys_mount+0xbe/0x150 [ 844.055696] do_syscall_64+0x1b9/0x820 [ 844.059602] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 844.064989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 844.069942] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 844.075001] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 844.080050] ? recalc_sigpending_tsk+0x180/0x180 [ 844.084928] ? kasan_check_write+0x14/0x20 [ 844.089187] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 844.094073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.099286] RIP: 0033:0x457089 [ 844.102497] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 844.121869] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 844.129608] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 844.136902] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 844.144193] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 844.151480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 844.158766] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 0000000000000009 22:24:24 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b000000, &(0x7f0000de9000)) 22:24:24 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4000000000000000, &(0x7f0000de9000)) 22:24:24 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000240)) 22:24:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x202000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x5f, 0x84, &(0x7f00000000c0)="c8713fd35bb18c95646740d3c87b4ffb57cbcb4ee9223b4c9c747abc5a5b78393e3d9bd16f63f1e88277a3f0706d6e359adf15f25ceb62737903d2ea427a1f246c70f407da6d7cd1d0f14ebd1be8272aaf95027e9a43d10c034c3934134242", &(0x7f0000000280)=""/132, 0x449a8ed6}, 0x28) r1 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r2, &(0x7f0000000400)=""/100, 0x64) 22:24:24 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xe4ffffff00000000}, 0x2c) 22:24:24 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reise%fs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:24 executing program 0 (fault-call:3 fault-nth:10): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x192, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 844.624982] FAULT_INJECTION: forcing a failure. [ 844.624982] name failslab, interval 1, probability 0, space 0, times 0 [ 844.636377] CPU: 1 PID: 12575 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 844.644893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.654257] Call Trace: [ 844.656876] dump_stack+0x1c9/0x2b4 [ 844.661918] ? dump_stack_print_info.cold.2+0x52/0x52 [ 844.670514] ? do_syscall_64+0x1b9/0x820 22:24:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x18}, 0x2c) 22:24:25 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000940)={r1, @in={{0x2, 0x4e24, @broadcast}}}, &(0x7f0000000240)=0x84) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000280)={0x2e, 0x4, 0x0, {0x6, 0xffffffffffff712c, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 844.674602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.679989] ? perf_trace_lock+0xde/0x920 [ 844.684170] should_fail.cold.4+0xa/0x11 [ 844.688267] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 844.693405] ? __kmalloc_track_caller+0x26e/0x720 [ 844.698289] ? rcu_is_watching+0x8c/0x150 [ 844.702460] ? rcu_pm_notify+0xc0/0xc0 [ 844.706381] ? find_held_lock+0x36/0x1c0 [ 844.710490] ? check_same_owner+0x340/0x340 [ 844.721484] ? rcu_note_context_switch+0x680/0x680 [ 844.726452] __should_failslab+0x124/0x180 [ 844.730802] should_failslab+0x9/0x14 [ 844.734625] __kmalloc_track_caller+0x2ae/0x720 [ 844.739822] ? vfs_parse_fs_string+0x1fd/0x2b0 [ 844.744439] ? legacy_parse_monolithic+0xde/0x1e0 [ 844.749313] kmemdup+0x24/0x50 [ 844.752532] legacy_parse_monolithic+0xde/0x1e0 [ 844.757225] ? cmp_flag_name+0x50/0x50 [ 844.761142] do_mount+0x6d8/0x1e30 [ 844.764732] ? rcu_is_watching+0x8c/0x150 [ 844.768912] ? trace_hardirqs_on+0xbd/0x2c0 [ 844.773268] ? copy_mount_string+0x40/0x40 [ 844.777535] ? copy_mount_options+0x5f/0x380 [ 844.781973] ? kmem_cache_alloc_trace+0x324/0x730 [ 844.786848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 844.792412] ? _copy_from_user+0xdf/0x150 [ 844.796585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.802145] ? copy_mount_options+0x285/0x380 [ 844.806673] ksys_mount+0x12d/0x140 [ 844.810327] __x64_sys_mount+0xbe/0x150 [ 844.814841] do_syscall_64+0x1b9/0x820 [ 844.818758] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 22:24:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x300000000000000}, 0x2c) 22:24:25 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) mlockall(0x1) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e00000000004000065732fed017c8d7b00000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000380)=""/107, &(0x7f0000000280)=0x6b) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f0000000240)=[{{&(0x7f0000000080)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000005c0)={r1, 0x7fff}, 0x8) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 844.824149] ? syscall_return_slowpath+0x5e0/0x5e0 [ 844.829105] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 844.834149] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 844.839182] ? recalc_sigpending_tsk+0x180/0x180 [ 844.843958] ? kasan_check_write+0x14/0x20 [ 844.848221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 844.853097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.863804] RIP: 0033:0x457089 [ 844.867015] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 844.886405] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 844.894136] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 844.901425] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 844.908704] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 844.915990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 844.923285] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 000000000000000a 22:24:25 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2a03000000000000, &(0x7f0000de9000)) 22:24:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x117, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:25 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xedc0, &(0x7f0000de9000)) 22:24:25 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x5000000}, 0x2c) 22:24:25 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reise\nfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:25 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4, &(0x7f0000de9000)) 22:24:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="280000000400000000000000000000000500080000000000f8ffffffffffffff000000000000aecc"], 0x28) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r2) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000900)={0x2, 0x0, @local}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f00000008c0)='setgroups\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x3) r6 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r6) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, r2) timer_create(0x0, &(0x7f0000000500), &(0x7f0000000840)) timer_gettime(0x0, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setgid(r7) getpeername$packet(0xffffffffffffff9c, &(0x7f00000002c0), &(0x7f0000000380)=0x5) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000400)={@ipv4={[], [], @broadcast}}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) read(r3, &(0x7f0000000400)=""/100, 0x64) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x5, 0x0, 0xff, 0x2, 0x4000000, 0x2, 0xffffffffffffa8c2}, 0x20) shmget(0x2, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) 22:24:26 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8c01000000000000, &(0x7f0000de9000)) 22:24:26 executing program 0 (fault-call:3 fault-nth:11): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x11000000}, 0x2c) 22:24:26 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiser/s\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:26 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f00, &(0x7f0000de9000)) 22:24:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x24, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 845.747488] FAULT_INJECTION: forcing a failure. [ 845.747488] name failslab, interval 1, probability 0, space 0, times 0 [ 845.758814] CPU: 0 PID: 12661 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 845.767327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.776702] Call Trace: [ 845.779320] dump_stack+0x1c9/0x2b4 [ 845.782977] ? dump_stack_print_info.cold.2+0x52/0x52 [ 845.788300] ? do_syscall_64+0x1b9/0x820 [ 845.792397] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.797890] should_fail.cold.4+0xa/0x11 [ 845.801988] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 845.807132] ? __kmalloc_track_caller+0x26e/0x720 [ 845.811996] ? rcu_is_watching+0x8c/0x150 [ 845.816171] ? trace_hardirqs_on+0xbd/0x2c0 [ 845.820517] ? rcu_pm_notify+0xc0/0xc0 [ 845.824428] ? find_held_lock+0x36/0x1c0 [ 845.828527] ? check_same_owner+0x340/0x340 [ 845.832964] ? rcu_note_context_switch+0x680/0x680 [ 845.837926] __should_failslab+0x124/0x180 [ 845.842186] should_failslab+0x9/0x14 22:24:26 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xc0ed0000, &(0x7f0000de9000)) 22:24:26 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r6) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x18000000}, 0x2c) [ 845.846011] __kmalloc_track_caller+0x2ae/0x720 [ 845.850727] ? vfs_parse_fs_string+0x1fd/0x2b0 [ 845.855345] ? legacy_parse_monolithic+0xde/0x1e0 [ 845.860227] kmemdup+0x24/0x50 [ 845.863452] legacy_parse_monolithic+0xde/0x1e0 [ 845.868149] ? cmp_flag_name+0x50/0x50 [ 845.872081] do_mount+0x6d8/0x1e30 [ 845.875651] ? rcu_is_watching+0x8c/0x150 [ 845.879825] ? trace_hardirqs_on+0xbd/0x2c0 [ 845.884183] ? copy_mount_string+0x40/0x40 [ 845.888455] ? copy_mount_options+0x5f/0x380 [ 845.892899] ? kmem_cache_alloc_trace+0x324/0x730 [ 845.897848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 845.903431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.909003] ? copy_mount_options+0x285/0x380 [ 845.913547] ksys_mount+0x12d/0x140 [ 845.917207] __x64_sys_mount+0xbe/0x150 [ 845.921216] do_syscall_64+0x1b9/0x820 [ 845.925137] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 845.930533] ? syscall_return_slowpath+0x5e0/0x5e0 [ 845.936022] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 845.941168] ? prepare_exit_to_usermode+0x3b0/0x3b0 22:24:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:26 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x18c, &(0x7f0000de9000)) [ 845.946217] ? recalc_sigpending_tsk+0x180/0x180 [ 845.951008] ? kasan_check_write+0x14/0x20 [ 845.955281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.960156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.965481] RIP: 0033:0x457089 [ 845.968703] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 845.987624] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:24:26 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reisergs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) [ 845.995360] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 846.002674] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 846.009964] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 846.017253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 846.024547] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 000000000000000b 22:24:26 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x14000000}, 0x2c) 22:24:26 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa, &(0x7f0000de9000)) 22:24:26 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b00000000000000, &(0x7f0000de9000)) 22:24:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x18000000}, 0x2c) 22:24:27 executing program 0 (fault-call:3 fault-nth:12): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:27 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiser\ns\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:27 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000940)={@nl=@kern={0x10, 0x0, 0x0, 0xa0000040}, {&(0x7f0000000240)=""/128, 0x80}, &(0x7f0000000380), 0x20}, 0xa0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x68, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x8000000}, 0x2c) 22:24:27 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffff1f0000000000, &(0x7f0000de9000)) 22:24:27 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8c010000, &(0x7f0000de9000)) [ 846.767275] FAULT_INJECTION: forcing a failure. [ 846.767275] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.779182] CPU: 0 PID: 12726 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 846.787789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.797174] Call Trace: [ 846.799790] dump_stack+0x1c9/0x2b4 [ 846.803446] ? dump_stack_print_info.cold.2+0x52/0x52 [ 846.808672] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 846.813387] should_fail.cold.4+0xa/0x11 22:24:27 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa0030000, &(0x7f0000de9000)) 22:24:27 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfffffff6, &(0x7f0000de9000)) [ 846.817484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 846.822614] ? kernel_text_address+0x79/0xf0 [ 846.827069] ? __kernel_text_address+0xd/0x40 [ 846.831598] ? unwind_get_return_address+0x61/0xa0 [ 846.836573] ? mark_held_locks+0x160/0x160 [ 846.840846] ? save_stack+0xa9/0xd0 [ 846.844504] ? save_stack+0x43/0xd0 [ 846.848165] ? kasan_kmalloc+0xc4/0xe0 [ 846.852086] ? __kmalloc_track_caller+0x14a/0x720 [ 846.856954] ? krealloc+0x65/0xb0 [ 846.860427] ? apparmor_fs_context_parse_param+0x1dd/0x490 [ 846.866095] ? security_fs_context_parse_param+0x54/0xb0 [ 846.871675] ? vfs_parse_fs_param+0x127/0x2c0 [ 846.876213] ? vfs_parse_fs_string+0x1d5/0x2b0 [ 846.880827] ? do_mount+0x658/0x1e30 [ 846.884559] ? ksys_mount+0x12d/0x140 [ 846.888414] ? __x64_sys_mount+0xbe/0x150 [ 846.892581] ? do_syscall_64+0x1b9/0x820 [ 846.896665] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.902068] ? perf_trace_lock+0xde/0x920 [ 846.906277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.911833] ? should_fail+0x246/0xd86 22:24:27 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x100000000000000, &(0x7f0000de9000)) 22:24:27 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xcd02000000000000, &(0x7f0000de9000)) [ 846.915745] ? zap_class+0x740/0x740 [ 846.919486] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 846.924625] __alloc_pages_nodemask+0x365/0xd10 [ 846.929396] ? __kmalloc_track_caller+0x26e/0x720 [ 846.934407] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 846.939456] ? rcu_pm_notify+0xc0/0xc0 [ 846.943381] ? find_held_lock+0x36/0x1c0 [ 846.947482] ? trace_hardirqs_off+0xb8/0x2b0 [ 846.951919] cache_grow_begin+0x91/0x710 [ 846.956017] __kmalloc_track_caller+0x63d/0x720 [ 846.960731] ? vfs_parse_fs_string+0x1fd/0x2b0 22:24:27 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda, &(0x7f0000de9000)) 22:24:27 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3f00000000000000, &(0x7f0000de9000)) [ 846.965370] ? legacy_parse_monolithic+0xde/0x1e0 [ 846.970319] kmemdup+0x24/0x50 [ 846.973505] legacy_parse_monolithic+0xde/0x1e0 [ 846.978177] ? cmp_flag_name+0x50/0x50 [ 846.982088] do_mount+0x6d8/0x1e30 [ 846.985645] ? rcu_is_watching+0x8c/0x150 [ 846.989806] ? trace_hardirqs_on+0xbd/0x2c0 [ 846.994144] ? copy_mount_string+0x40/0x40 [ 846.998405] ? copy_mount_options+0x5f/0x380 [ 847.002918] ? kmem_cache_alloc_trace+0x324/0x730 [ 847.007787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.013361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.018927] ? copy_mount_options+0x285/0x380 [ 847.023451] ksys_mount+0x12d/0x140 [ 847.027099] __x64_sys_mount+0xbe/0x150 [ 847.031096] do_syscall_64+0x1b9/0x820 [ 847.035006] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 847.040412] ? syscall_return_slowpath+0x5e0/0x5e0 [ 847.045441] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 847.050476] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 847.055507] ? recalc_sigpending_tsk+0x180/0x180 [ 847.060708] ? kasan_check_write+0x14/0x20 22:24:27 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffff7f00000000, &(0x7f0000de9000)) 22:24:27 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffff7f, &(0x7f0000de9000)) [ 847.064967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 847.069840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.075054] RIP: 0033:0x457089 [ 847.078265] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 847.097184] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 847.104928] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 22:24:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xdf, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 847.112219] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 847.119511] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 847.126803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 847.134096] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 000000000000000c 22:24:27 executing program 0 (fault-call:3 fault-nth:13): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = add_key(&(0x7f0000000840)='rxrpc\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, 0x0, r0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x22}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000280), &(0x7f0000000180), &(0x7f0000000080), &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket(0x3, 0x4, 0x4) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000040)={0xffffffffffffffb3, 0x1647, 0x3cc8, 0x80000000}, 0x6) ioctl(r2, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000000140)=0x81, 0x4) getsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000bfcffc), &(0x7f0000000100)=0x4) read(r1, &(0x7f0000000400)=""/100, 0x64) 22:24:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xa00}, 0x2c) 22:24:27 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf6ffffff00000000, &(0x7f0000de9000)) 22:24:27 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xbd010000, &(0x7f0000de9000)) 22:24:27 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiser%s\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1a5, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:27 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:27 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xffff8000}, 0x2c) [ 847.528283] FAULT_INJECTION: forcing a failure. [ 847.528283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 847.540255] CPU: 0 PID: 12787 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 847.548861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.558245] Call Trace: [ 847.560862] dump_stack+0x1c9/0x2b4 [ 847.564531] ? dump_stack_print_info.cold.2+0x52/0x52 [ 847.569755] ? perf_trace_lock+0xde/0x920 [ 847.573956] should_fail.cold.4+0xa/0x11 [ 847.578059] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 847.583211] ? rcu_is_watching+0x8c/0x150 [ 847.587391] ? graph_lock+0x170/0x170 [ 847.591218] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 847.595936] ? find_held_lock+0x36/0x1c0 [ 847.600061] ? check_same_owner+0x340/0x340 [ 847.604417] ? rcu_note_context_switch+0x680/0x680 [ 847.609379] ? legacy_parse_monolithic+0xde/0x1e0 [ 847.614355] __alloc_pages_nodemask+0x365/0xd10 [ 847.619086] ? __alloc_pages_slowpath+0x2cb0/0x2cb0 [ 847.624137] ? lock_downgrade+0x8f0/0x8f0 [ 847.628424] ? __kmalloc_track_caller+0x26e/0x720 [ 847.633298] ? rcu_is_watching+0x8c/0x150 [ 847.637469] ? trace_hardirqs_on+0xbd/0x2c0 [ 847.641815] ? rcu_pm_notify+0xc0/0xc0 [ 847.645742] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 847.651309] alloc_pages_current+0x10c/0x210 [ 847.655921] get_zeroed_page+0x14/0x50 [ 847.659826] legacy_validate+0x133/0x220 [ 847.663904] ? logfc+0x760/0x760 [ 847.667298] vfs_get_tree+0x144/0x5c0 [ 847.671124] do_mount+0x6f9/0x1e30 [ 847.674683] ? rcu_is_watching+0x8c/0x150 [ 847.678838] ? trace_hardirqs_on+0xbd/0x2c0 [ 847.683188] ? copy_mount_string+0x40/0x40 [ 847.687468] ? copy_mount_options+0x5f/0x380 [ 847.691904] ? kmem_cache_alloc_trace+0x324/0x730 [ 847.696773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.702342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.707923] ? copy_mount_options+0x285/0x380 [ 847.712454] ksys_mount+0x12d/0x140 [ 847.716134] __x64_sys_mount+0xbe/0x150 [ 847.720148] do_syscall_64+0x1b9/0x820 [ 847.724079] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 847.729478] ? syscall_return_slowpath+0x5e0/0x5e0 [ 847.734431] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 847.739473] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 847.744513] ? recalc_sigpending_tsk+0x180/0x180 [ 847.749291] ? kasan_check_write+0x14/0x20 [ 847.753554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 847.758429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.763634] RIP: 0033:0x457089 [ 847.766843] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 847.785763] RSP: 002b:00007f6da12e1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 847.793498] RAX: ffffffffffffffda RBX: 00007f6da12e26d4 RCX: 0000000000457089 [ 847.800782] RDX: 0000000020c77ffa RSI: 0000000020058ffd RDI: 0000000020907ff8 [ 847.808071] RBP: 0000000000930140 R08: 0000000020de9000 R09: 0000000000000000 [ 847.815356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 22:24:28 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffff1f00, &(0x7f0000de9000)) 22:24:28 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x180, &(0x7f0000de9000)) [ 847.822645] R13: 00000000004d2c20 R14: 00000000004c7e6a R15: 000000000000000d 22:24:28 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiser.s\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:28 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x2000000003f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000380)="af110d0bce306518a80a22b82d7662cf51b6f3568cc0c5e8729f7bc37e1e62a3f7138d88b285eb4c9539", 0x2a) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000940)={0x0, 0x0}) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0xfffffffeffffffff, 0x5, 0xfd2a, 0x4, 0x0, 0x7, 0x1000, 0x4, 0xffffffff, 0x1, 0x3, 0xa4, 0xcd4, 0x1f, 0x20, 0x0, 0x9, 0xffffffff, 0x800, 0xc0, 0x6, 0x2, 0x8000, 0x3, 0x81, 0x0, 0x157b1ba5, 0x1000, 0x6b, 0x8, 0x3, 0x4, 0x1, 0xdcd4, 0x0, 0x7fffffff, 0x0, 0x8, 0x5, @perf_bp={&(0x7f00000003c0), 0x1}, 0x1000, 0xf95e, 0x2, 0x5, 0x7f, 0x400, 0x101}, r9, 0x8, r7, 0x8) write$P9_RSETATTR(r0, &(0x7f0000000280)={0x7, 0x1b, 0x2}, 0x7) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000240)=0x1, 0x4) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:28 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c000000, &(0x7f0000de9000)) 22:24:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x4000}, 0x2c) 22:24:28 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe3030000, &(0x7f0000de9000)) 22:24:28 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:28 executing program 5: getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYBLOB="d64b74f17ec0"], &(0x7f0000000600)=0x1) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000500)=[@text64={0x40, &(0x7f0000000480)="660f38816b0066baf80cb8509b4186ef66bafc0cb87a5b0000ef400f09440f20c0350d000000440f22c0b991000040b8e4dd0000ba000000000f30b9800000c00f3235002000000f3066450f083ef2650f01c90f01d1c7442400d3000000c7442402e4000000c7442406000000000f011424", 0x72}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:24:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x11f, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:28 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfl\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:28 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3000000, &(0x7f0000de9000)) 22:24:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x200000000000000}, 0x2c) 22:24:28 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:28 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda00000000000000, &(0x7f0000de9000)) 22:24:28 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x800000000000000}, 0x2c) 22:24:28 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x80010000, &(0x7f0000de9000)) 22:24:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1cb, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:28 executing program 3: r0 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) mount$9p_virtio(&(0x7f00000006c0)='lo\x00', &(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='9p\x00', 0x804000, &(0x7f00000009c0)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}, {@noextend='noextend'}, {@access_client='access=client'}, {@cache_none='cache=none'}]}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r2, 0x3f}, 0x8) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) keyctl$link(0x8, r0, r3) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r1, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000a00)) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) mount$9p_unix(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)='9p\x00', 0x84028, &(0x7f0000000b80)={'trans=unix,', {[{@access_any='access=any'}]}}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r1, 0x46b, &(0x7f0000000380)}, 0x10) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000003c0)={r2, 0x4}, &(0x7f00000005c0)=0x8) connect$bt_sco(r1, &(0x7f0000000280)={0x1f, {0x9, 0x9, 0x2, 0x0, 0x20, 0x5}}, 0xffffffffffffffc8) sendmmsg(r8, &(0x7f0000000280), 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:28 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfu\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:28 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b00000000000000, &(0x7f0000de9000)) 22:24:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x500000000000000}, 0x2c) 22:24:29 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x300, &(0x7f0000de9000)) 22:24:29 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461787fff65", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:29 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf#\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xc00}, 0x2c) 22:24:29 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f000000, &(0x7f0000de9000)) 22:24:29 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x3, 0x87e) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', "73797a35000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a3529883e600", 'syz0\x00', &(0x7f0000000940)=""/196, 0xc4, 0x8009, 0x10001, 0xffffffffffffff7f, 0xdc04, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xac, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:29 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x5, 0x20, 0x7fff, 0xffffffffffffff00}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x8, 0x20, 0x9}, 0x10) r2 = socket$inet6(0xa, 0x80001, 0x0) setxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@random={'trusted.', 'ppp1GPLsystem#lo^^cgroupGPLbdev\'GPL\x00'}, &(0x7f0000000680)='vmnet1proc#em1keyringbdev$GPLwlan0\x00', 0x23, 0x2) sendmsg$nl_crypto(r0, &(0x7f0000001940)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x60020400}, 0xc, &(0x7f0000001900)={&(0x7f0000001800)=@get={0xe0, 0x13, 0x300, 0x70bd27, 0x25dfdbfb, {{'tgr128\x00'}, [], [], 0x2400, 0x2000}}, 0xe0}, 0x1, 0x0, 0x0, 0x854}, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)=0x0) fcntl$lock(r2, 0x7, &(0x7f00000005c0)={0x1, 0x4, 0xb6b7, 0x7, r3}) recvfrom$inet6(r0, &(0x7f0000000440)=""/212, 0xd4, 0x10000, &(0x7f0000000100)={0xa, 0x4e21, 0xfffffffffffffff9, @remote, 0xfff}, 0x1c) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180), &(0x7f0000000540)=0x4) sendmsg$nl_netfilter(r0, &(0x7f0000001780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x201000}, 0xc, &(0x7f0000001740)={&(0x7f0000000700)={0x1014, 0x1, 0xa, 0x0, 0x70bd28, 0x25dfdbfb, {0xc}, [@generic="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"]}, 0x1014}, 0x1, 0x0, 0x0, 0x8040}, 0x4840) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f00000001c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x24b) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @local}}]}, 0x190) 22:24:29 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3, &(0x7f0000de9000)) 22:24:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xa}, 0x2c) 22:24:29 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3f000000, &(0x7f0000de9000)) 22:24:29 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfi\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x49, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:29 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000240)=0x21e, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) time(&(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:29 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xbd010000, &(0x7f0000de9000)) 22:24:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000040)="120345", 0x3}], 0x1, 0x0) r1 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000100)="c478edc93bd15551d8ebc7c573276f", 0xf, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000010c0)="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", 0x1000, 0xfffffffffffffffa) keyctl$unlink(0x9, r1, r2) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000004c0)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 22:24:29 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461780a0365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x80ffff00000000}, 0x2c) 22:24:29 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe303, &(0x7f0000de9000)) 22:24:29 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfc\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x15c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:29 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xca03000000000000, &(0x7f0000de9000)) 22:24:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x80ffff}, 0x2c) 22:24:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0xfffffffffffffebf) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffd7e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1, 0x204000) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000000c0)=0x8) 22:24:30 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178da0365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:30 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000005c0)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r3, 0x511, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xba}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xbb, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x400000}, 0x2c) 22:24:30 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfeffffff00000000, &(0x7f0000de9000)) 22:24:30 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c, &(0x7f0000de9000)) 22:24:30 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf+\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x34020000}, 0x2c) 22:24:30 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) r3 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x80804, 0x3) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000940)={{0x3, 0x4, 0x6a, 0x6, 'syz1\x00'}, 0x0, [0x1, 0x3, 0x8001, 0xd30, 0xffffffff, 0x0, 0x5, 0x4, 0xfffffffffffffffe, 0xfc53, 0xfff, 0x391a, 0x1f, 0x0, 0x4, 0x800, 0x7, 0x10001, 0x1, 0x0, 0x7f, 0x9, 0xc4fb, 0xbc9, 0x8001, 0x800, 0x1, 0x400, 0x0, 0x3, 0x7fff, 0xa93, 0x9, 0x2, 0x10001, 0x8, 0x5, 0x6, 0x2, 0xb86, 0x5, 0x40, 0x10000, 0x9, 0x1, 0x9, 0x8, 0x6, 0x9, 0x6, 0x7f, 0x0, 0x6cc4, 0x4, 0xff, 0x5, 0x8, 0x6, 0x8, 0x8c4, 0x7, 0x0, 0x1253, 0x127065b, 0x6, 0x1, 0x7ff, 0xd, 0x0, 0x0, 0x7fff, 0x2, 0xbf, 0x4, 0x8, 0xfffffffffffffff8, 0x20, 0xa8e8, 0x7fffffff, 0x100000000, 0x3, 0x4, 0x49f0, 0x80000000, 0x38b2, 0x81, 0x6, 0x2, 0x3, 0x7, 0x1, 0x8000, 0x7, 0xfff, 0xf965, 0x7, 0xff8000000, 0x3, 0x8001, 0x1, 0x4, 0x889c, 0x0, 0x4, 0x40000000000, 0x127, 0x380, 0x6, 0xcf, 0xfffffffffffffffb, 0x0, 0x4, 0x51, 0xec, 0x10001, 0x6, 0x3, 0x5, 0x0, 0x6, 0x1ff, 0x7ff, 0x7f, 0x5, 0x1, 0x7, 0x6, 0x200], {0x0, 0x989680}}) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000380)="e43c13d261931d5a13eee6a0c09d54e2efc458b7eda4beab0331d99c71fbd644f2f7db89cbea8c380cc62dbfa7b47a86d748a2254020c3b39b33a91d9c934f4c94", 0x41, r3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000ec0)=@xdp, &(0x7f0000000440)=0x80) 22:24:30 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffffff00000000, &(0x7f0000de9000)) 22:24:30 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178030365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1a6, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:30 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf.\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:30 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f00000000000000, &(0x7f0000de9000)) 22:24:30 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000002901d3ff0000001943dc000200000000009c002e2366696c"], 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access'}}]}}) vmsplice(r1, &(0x7f0000000440)=[{&(0x7f0000000640)="ad2bb8c0df1f14bae6473b0ff3e8043d3ba2b766d05643f6e2e0b58a7941ac46e012d83c49a70362a4610b88c78ea0fff150245f1656d63a72f8ed4eca9ef7261fa79caa2a", 0x45}], 0x1, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f0000000540)=""/158, 0x9e) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)) 22:24:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xf00}, 0x2c) 22:24:30 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffff8c, &(0x7f0000de9000)) 22:24:30 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461784b0365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:30 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffff1f00, &(0x7f0000de9000)) 22:24:30 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf0\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x6}, 0x2c) 22:24:30 executing program 5: request_key(&(0x7f00000000c0)="2d8859247b8dcb0cb1cff4dc617db0505aa68ddb15fc988fa2e21351da2134689f5cac65547a05c7c3b84836b8998652c99f747c4cdf0e94d76665ce2603d01df42bce60a6c139bb307e7cf6e41ef85d22958c1f0d9ebe79447b6b4d264b2625ba63faf0ba5b311c82d246f587fd8f3fcccd8d0f29d36d32032bef74266c9d121997b781611a06b565c04de03327546ea3a58d", &(0x7f00000011c0)={0x65, 0x78, 0x7a, 0x2}, &(0x7f0000000000)='\x00', 0x0) 22:24:30 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e00000000000000, &(0x7f0000de9000)) 22:24:30 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1ce, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:30 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x14}, 0x2c) 22:24:31 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461786e0365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:31 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3000000, &(0x7f0000de9000)) 22:24:31 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf%\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:31 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='irlan0\x00', 0xf1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='maps\x00') ioctl$TIOCGPTPEER(r1, 0x5441, 0x8000) fcntl$setpipe(r0, 0x407, 0x7) io_setup(0x1, &(0x7f0000000040)=0x0) clock_gettime(0x20000000, &(0x7f0000000000)={0x0}) io_getevents(r2, 0x7, 0xa41, &(0x7f0000000240)=[{}], &(0x7f0000000280)={r3}) io_destroy(r2) rmdir(&(0x7f0000000100)='./file0\x00') 22:24:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x10}, 0x2c) 22:24:31 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa00000000000000, &(0x7f0000de9000)) 22:24:31 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a18c80700315f85715170") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x1, 0x20d8b677, @empty, 0xf43}, 0xffffffffffffff93) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8010000590001000000000000000000ff210000000000000000000000000001e00000c200000000000000d7de3d470000fcffffff0000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:31 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda00, &(0x7f0000de9000)) 22:24:31 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461782c0365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x4001000000000005, 0xfffffffffffffffe) getsockopt$inet_buf(r1, 0x84, 0x12, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) 22:24:31 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfp\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x193, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xd00000000000000}, 0x2c) 22:24:31 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2802, &(0x7f0000de9000)) 22:24:31 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'gre0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000280)={@mcast1, r7}, 0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:31 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c00, &(0x7f0000de9000)) 22:24:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xe000000}, 0x2c) 22:24:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000a80)=""/237) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000100)=r1) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000dc00000000000000819500000000004000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f000031aff8)={r0, r2}) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)={r0}) mlockall(0x0) 22:24:31 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2, &(0x7f0000de9000)) 22:24:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x111, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:31 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00@e', 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:31 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf\n\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:31 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1bd, &(0x7f0000de9000)) 22:24:31 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xb00}, 0x2c) 22:24:31 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x1, 0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x74, &(0x7f0000000380)=[@in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0x7, @loopback, 0x5}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x2}, @in6={0xa, 0x4e20, 0x1, @mcast1, 0x4}]}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000940)={r1, 0x93, "4a4c478804e05976904e9596197bc1ceed656344d6c5f0c0d37df21fd9010134a2e0bb4a5cc32a05791f3feb1fa165b8ce7bd00d793dc7b51475e1012b744f0361996488a1ad610f1f92eeb94143c3172168d629eafa5b155bf0ef7a5f8cd1082998d747acab1ccfc6a6e81288c02bd6b2a47fbb5669c5003d40ec569b50a2cdf15deadb805088ffc103b6c6ea2d33ebac172d"}, &(0x7f0000000600)=0x9b) r2 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000006c0)={r3, 0x3f}, 0x8) r4 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r4) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r2, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r8, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r9, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r9, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:31 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x228, &(0x7f0000de9000)) 22:24:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x32, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x300}, 0x2c) 22:24:32 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2000000, &(0x7f0000de9000)) 22:24:32 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfX\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:32 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178001465", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:32 executing program 5: open$dir(&(0x7f0000000100)='./file0\x00', 0x2040, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x17cd, &(0x7f00000005c0)=ANY=[]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x200400, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000240)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x79fd, &(0x7f0000000240)=ANY=[]) truncate(&(0x7f0000000180)='./file0\x00', 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c, 0x80000) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000300)='fuse\x00', 0x5, 0x3) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='yam0\x00') 22:24:32 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={r1}, 0x8) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xe5, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x37c}, 0x2c) 22:24:32 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e00, &(0x7f0000de9000)) 22:24:32 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x40000000, &(0x7f0000de9000)) 22:24:32 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfo\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:32 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="240000000d0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000040)={'raw\x00', 0x3b, "e5aea7ee6e27f8c4d8ed68d268253d0d85e2f2c6f29736491a51f542eff954018d154b338e7c0a300db0c7bd87cee9ad9fb971ffd3973887052925"}, &(0x7f00000000c0)=0x5f) 22:24:32 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178020365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:32 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3f000000, &(0x7f0000de9000)) 22:24:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xc00000000000000}, 0x2c) 22:24:32 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1fffff, &(0x7f0000de9000)) 22:24:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1ab, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 852.170495] netlink: 'syz-executor5': attribute type 1 has an invalid length. 22:24:32 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) mlockall(0x1) 22:24:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xb00000000000000}, 0x2c) 22:24:32 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x32a, &(0x7f0000de9000)) 22:24:32 executing program 5: socket(0x10, 0x802, 0x0) 22:24:32 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf-\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:32 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3f00, &(0x7f0000de9000)) 22:24:32 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178100365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:32 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) sendto$inet(r0, &(0x7f00000000c0)="3a00e23bce38d0445ee95e9796ebbc717ddf2c740408ca14b75dc4ac7d9a14fe8d2a8dd9e42bfd6af230f2b3f45704f57f69f98b383291f5afc9850f2a82c566a1a431883aaa871c4ff61c66471535897c6fd381c53ba5254cdb0b5661", 0x5d, 0x4010, &(0x7f0000000300)={0x2, 0x4e22, @multicast2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000140, 0x0, 0x0, 0x20000170, 0x200001a0], 0x0, &(0x7f0000000000), &(0x7f0000000140)=ANY=[@ANYBLOB="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"]}, 0x208) 22:24:32 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x10000000}, 0x2c) 22:24:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x13, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:32 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4901000000000000, &(0x7f0000de9000)) 22:24:32 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2802, &(0x7f0000de9000)) 22:24:33 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfx\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) [ 852.671717] kernel msg: ebtables bug: please report to author: Wrong len argument [ 852.726330] kernel msg: ebtables bug: please report to author: Wrong len argument 22:24:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1800}, 0x2c) 22:24:33 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="6461785f0365", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xe9, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:33 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf0ffffff00000000, &(0x7f0000de9000)) 22:24:33 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x200000000000000, &(0x7f0000de9000)) 22:24:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x10000000}, 0x2c) 22:24:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1300}, 0x2c) 22:24:33 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfd\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x185, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:33 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00\ne', 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:33 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000001b0000000000000000000000000000000007e69731a28620317b51e46bf8200502e5575ac0701b9dbd5751b0a7d96c4dbed61a220ae472bfb67c372173ebf737308c88f5ad88a13a642afcd508403807f6395b5fd325fff2c8f050b15a44133fc7f61d1931c3d4c0e93650586b7a4e791393730bf0d6e904c305515124efa4b33e52a20ff499ff1d97"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x1f, &(0x7f00000005c0)="0a5cc92600315f85714070fff8a1a624868c933c74d730de9c941d48c67db32493b8cd808f8dedcc57e5ca06021a99a2425dcf97f59f839fdf5b8eb4e8ec96dfaca27acb8deeaad46aa25cecc7090dfbc885467bd9c85ab81fbc19e5d85572169400c8392a") add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xa00000000000000}, 0x2c) 22:24:33 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7fff, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x9, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x51, 0x4, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f0000000080)="c00ab74d952032641fc09e9f2fe3ea0fde2437c215880a670111010e5c178c73c0bf35aa885b4b8cefd322540451c6fcdffad59d87bfa668906747ed8cbc008efe8580d5d1b76872356f"}, 0x18) 22:24:33 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b00, &(0x7f0000de9000)) 22:24:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x15f, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:33 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4901, &(0x7f0000de9000)) 22:24:33 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserf*\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:33 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000265", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:33 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$key(0xf, 0x3, 0x2) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1c7, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:33 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x24}, 0x2c) 22:24:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0xfff) write(r0, &(0x7f0000000740)="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", 0x13c) r1 = dup3(r0, r0, 0x80000) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x8, 0x2707, 0x7ff, 0x6, 0x8c8, 0x54b2, 0x100, 0xff, 0x1, 0x1f7d}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="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") 22:24:33 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4901, &(0x7f0000de9000)) 22:24:34 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:34 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x20100000, &(0x7f0000de9000)) [ 853.782203] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:34 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)='dax\x00\ne', 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:34 executing program 5: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x4, 0xb}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10000, 0x0, 0x1, 0xf5bf, 0x0, 0xff, 0x6, 0xe, 0x6, 0x8000, 0x0, 0x2b, 0x1, 0x8, 0x4765e98, 0x5, 0x562, 0x7, 0x9, 0x5417, 0x20, 0x1f, 0x100000001, 0x4, 0x93, 0x1, 0x5, 0x7, 0x8a07, 0x4, 0x5, 0xfffffffffffffffd, 0x7f, 0x97, 0x200, 0x4, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000200), 0x6}, 0x4000, 0x6, 0x8, 0x5, 0x5, 0x8}, r2, 0x9, r0, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7, 0x0) r4 = memfd_create(&(0x7f0000000140)="000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d535ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a", 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@loopback}, {0x8, 0x0, 0x0, 0x93c, 0x0, 0x0, 0x0, 0x2}, {}, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in=@multicast2}, 0x0, @in=@dev, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}}, 0xe8) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000000), 0x0) fadvise64(r3, 0x0, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r5, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = accept4(r1, 0x0, &(0x7f0000da8ffc), 0x80800) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) 22:24:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xf00000000000000}, 0x2c) 22:24:34 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000380)=0x80) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={0x10000, {0x2, 0x4e24, @loopback}, {0x2, 0x4e20}, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x1, 0x3f6, 0x2, 0x0, 0x9, 0x81, 0x9}) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x280, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000006c0)={r2, 0x3f}, 0x8) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r1, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="b8000000190001000000000000000019f1dba200000000000000000000000001e00000000e0000000000000000090000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000010000003423f532c0f27c000000007d7b947800000000000000f600000000000000000000000000000000000000005c0d00040000000000000000000000000000000000000000000000000000000000000000000000000000000097a85c3bb41c34ad00000000000000000000000000"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000940)=0xc) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000980)=r9) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000009c0)=0x4, 0x4) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:34 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f00, &(0x7f0000de9000)) 22:24:34 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xc0ed0000, &(0x7f0000de9000)) [ 853.946405] REISERFS (device loop6): using ordered data mode [ 853.952374] reiserfs: using flush barriers [ 854.017415] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 854.028686] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1000000000000}, 0x2c) 22:24:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x63, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:34 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @mcast2}}, 0xfffffc99) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0xfffffffffffffe01}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x264, &(0x7f0000001000)=@raw, &(0x7f0000001ff6)='syzkaller\x00', 0x0, 0xdb, &(0x7f0000004ffd)=""/219}, 0x48) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 22:24:34 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xcd020000, &(0x7f0000de9000)) 22:24:34 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178001465", 0x0, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:34 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x49010000, &(0x7f0000de9000)) [ 854.230934] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:34 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000102, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e00000011b00005e00000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) connect$bt_l2cap(r0, &(0x7f0000000280)={0x1f, 0x57e8, {0x10, 0x7, 0x3, 0x1, 0x0, 0x7f}, 0x1f, 0x5}, 0xe) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) connect$inet6(r4, &(0x7f0000000380)={0xa, 0x4e23, 0x39, @local, 0x8000000000}, 0x1c) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) r8 = pkey_alloc(0x0, 0x1) pkey_free(r8) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000240)) 22:24:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x13a, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 854.287764] REISERFS (device loop6): using ordered data mode [ 854.293681] reiserfs: using flush barriers [ 854.350471] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 854.361690] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:34 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs`', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:34 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x40000000}, 0x2c) 22:24:34 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x800) r1 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0xa0080) getsockopt$inet_buf(r1, 0x0, 0x10, &(0x7f0000000400)=""/4096, &(0x7f0000001400)=0x1000) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x24080, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xda30) r4 = socket$inet6(0xa, 0x3, 0x1) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}]}, 0x38}, 0x1, 0x0, 0x0, 0x4010}, 0x20004010) r6 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x8000000000000) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r2) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000100), 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001440)={0x0}, &(0x7f0000001480)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000014c0)={r7, 0x6, 0x8, 0x100}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f00000001c0)={0x0, 0x1, {0x0, 0x3}}) 22:24:34 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffffff00000000, &(0x7f0000de9000)) 22:24:34 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2000, &(0x7f0000de9000)) 22:24:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x31, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:34 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e00000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:35 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf0ffffff, &(0x7f0000de9000)) 22:24:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x500}, 0x2c) 22:24:35 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda00, &(0x7f0000de9000)) 22:24:35 executing program 5: pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) syz_mount_image$vfat(&(0x7f0000001800)='vfat\x00', &(0x7f0000001840)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f00000000c0)="640cf398ed02661acbcd1e4c0f4bf9b1d0ac6bb4f35093e32f407ab48330c8b7ff6260d67bcde3ef082e83eb5d46ea98b470c23f397d6def1f014eeb073ec4a4eec20a5c65a61f949eed2d08b276775fc43c6ee34bd367771be6700ccba6aab480d3441395a7f58cb2ff9427153b54c807223c2f84775e2c3609957ad1cdaee5d755ed8fd4c529eb", 0x88}], 0x20000000000000, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYRESDEC=r0]) lseek(r0, 0xfffffffffffffffe, 0x4) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x8001, 0x6, &(0x7f00000005c0)=[{&(0x7f00000001c0)="243d446b8fa2351e15ed583d58a6dcd64c8c35864579444a0aa323ca7a164ee530bc2404e3c88104e2a0d138d20333914b19f0cbc40e2ec4e26f0542954be92f750013dab6bfd0f2e4e7ce7204b7fb5c973b53b9e51785fa9f6ea0c51ccd23d77b2218f320ecae5fbc9a0ce806e6105e1f97d6c5661425d9980a354f4c4c55017c53471ec2d599a9cc6ca2cad3a4372d5d21f326469cb70ac22ca38be3ee322359c83c8084b263cb4b7afd3c963523e9bd8cd0f1862d0bfe09224f8baba5", 0xbe, 0x20}, {&(0x7f0000000280)="92830bce13868268584be331f7de367945299c47f4855b9d2d578f81beebb155fbc2ec0211416fe784a425850b00884e07f97bd31c418d2a0a383d69190a39d78bd0e7f86bb7fa4031ceb6474318ed5437c5c6a23614e1aad35e0b030021267aba2dcc7395c95e9d6603cdfd850b0be3e6bad75a90b818ef359bd69ab41c5e792d92fe39206310ab2a1bd19a14f5fe18735d0b9853b54b6791aaef2728884bcd3665a1affd58e90aa233aa1bfacb88f453bb186bff99d5f756468fe168a03cfecc9033f62d19c9ff3f0d1f5956e513", 0xcf, 0x9}, {&(0x7f0000000380)="f1bbdf56982cea1fcbddcb39bd660c2997e703533f16f2b63ee79e7e31e9988a49354705cf54717f2085695c4b79bea67f5462a43c509d6b1594abd7c007f72c59711a1cc90e236b744b26984678874e3249ff8bef61ebe7640a46f4e9f0f5b487b8cfacc01309d0df68ff6aed6a879fc2eb42abdd7c51ffc000c5898b640f0da70cc347540ae5ccba76198a415a417403", 0x91, 0x42f0}, {&(0x7f0000000080)="d97d8ccd9eb57d3e13bd1cb72ecff443ddfa", 0x12, 0x2}, {&(0x7f0000000480), 0x0, 0xbfb5}, {&(0x7f00000004c0)="f303533be802694e591506a3983337894a64d5ab5b283dde3624ae6d028f184109c47a776f37efd3f0ce20de930af9365beaa4d29c0888a15f7fac2dae6bc3af003838c265b22fb40e32340ca5e3523abe7e9696a8b73cedd480a305e362c5d92b06d146640bdbcf612fe5d72b96fd3acbf680912f46a624662b37e535ab43f555af0df3ccaa64219098bc2deb2e55a42da9c200fda8487aea0149b11003315a721b1332217b23e5b89e6b6b176d124064ed314abddbb8694de3fb570c73fe7410b9134b68c6", 0xc6, 0x1ff}], 0x220020, &(0x7f0000000680)='\x00') 22:24:35 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000240)="0a0dfb750d8f8613c76d5cc80700315f95713e70") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) socket$nl_route(0x10, 0x3, 0x0) ioctl(r3, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x137, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:35 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x900}, 0x2c) 22:24:35 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c00000000000000, &(0x7f0000de9000)) 22:24:35 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda, &(0x7f0000de9000)) 22:24:35 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe303000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 854.972246] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x402100, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000100)="0f0103f26d67f2f7320fc79b000000000f01cbc4c23dab8b0a000000f2a3381dd45266baf80cb8bcbd3f80ef66bafc0cb803000000ef0f239df20f5a5b00", 0x3e}], 0xaaaacd8, 0x0, &(0x7f0000000140), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 855.030546] REISERFS (device loop6): using ordered data mode [ 855.036521] reiserfs: using flush barriers 22:24:35 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xe7, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x7c03}, 0x2c) 22:24:35 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xbd01, &(0x7f0000de9000)) [ 855.111821] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 855.123089] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:35 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x300, &(0x7f0000de9000)) 22:24:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_newrule={0x20, 0x20, 0x401}, 0x20}}, 0x0) 22:24:35 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4901000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 855.305158] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 855.356034] REISERFS (device loop6): using ordered data mode [ 855.361990] reiserfs: using flush barriers 22:24:35 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2802000000000000, &(0x7f0000de9000)) 22:24:35 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x234}, 0x2c) 22:24:35 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000280)=0xffffffffffffffca) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000000, 0x2) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000003c0)={r1, 0xd67, 0x6, 0xfffffffffffffff7, 0x0, 0x80000001}, &(0x7f00000005c0)=0x14) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000600)) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) pipe2$9p(&(0x7f0000000240), 0x80800) socket$nl_route(0x10, 0x3, 0x0) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x60100) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r6, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getpeername(r6, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000380)={0x2, "3f95"}, 0x3) [ 855.402829] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. [ 855.420507] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 855.431750] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:36 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x35, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:36 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2a03000000000000, &(0x7f0000de9000)) 22:24:36 executing program 5: setrlimit(0x9, &(0x7f0000000180)) io_setup(0x8, &(0x7f0000000300)) 22:24:36 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x180, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x3}, 0x2c) 22:24:36 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf6ffffff, &(0x7f0000de9000)) 22:24:36 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2a030000, &(0x7f0000de9000)) 22:24:36 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x2, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x8001, 0x2020c0) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:36 executing program 5: ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000040)=""/4, 0xfffffffffffffff0) [ 855.806634] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x25, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x7}, 0x2c) 22:24:36 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x40000, &(0x7f0000de9000)) 22:24:36 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3ca, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 855.903387] REISERFS (device loop6): using ordered data mode [ 855.909391] reiserfs: using flush barriers 22:24:36 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa003, &(0x7f0000de9000)) [ 855.981802] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 855.993165] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r2, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) rename(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) [ 856.178931] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 856.213638] REISERFS (device loop6): using ordered data mode [ 856.219552] reiserfs: using flush barriers 22:24:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xe}, 0x2c) 22:24:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x168, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:36 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x0, 0x20000000000, @remote, 0x4}, 0xd6) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000400000000000000a69984dbe1000a0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000940)) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) getsockopt$bt_hci(r3, 0x0, 0x2, &(0x7f0000000380)=""/101, &(0x7f0000000280)=0x65) setitimer(0x2, &(0x7f00000005c0)={{0x77359400}, {0x0, 0x2710}}, &(0x7f0000000600)) 22:24:36 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:36 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4000, &(0x7f0000de9000)) 22:24:36 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8c01, &(0x7f0000de9000)) 22:24:36 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda00, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 856.233422] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 856.249980] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x3402000000000000}, 0x2c) 22:24:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x15e, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 856.372299] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:36 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1fffff, &(0x7f0000de9000)) 22:24:36 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3603000000000000, &(0x7f0000de9000)) [ 856.417291] REISERFS (device loop6): using ordered data mode [ 856.423296] reiserfs: using flush barriers 22:24:36 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xffffffff00000000}, 0x2c) 22:24:36 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000940)="59859fb41a27f67d77a1b7c4e43e162829dcb60585fa26e389feba6d131794485fe7c30c69f2aa46412696525d3fdfef53798f685ea4884a498b7a47672ee242278d2ff068b7557e7b4c69cb65cdbbeff18bc1ddcf0d8631f85b6272b7bfb789977f1c363aac4b35d553ca4a06dab57105735ca4f8276fd572d094dd4a3b80324fe012c3f0c736d15035314dcae5c4c2f24aa9784e02dbee7a03b95f8c395228b473d779de", 0xa5, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 856.483969] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 856.495313] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:36 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x98, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 856.621558] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 856.662586] REISERFS (device loop6): using ordered data mode [ 856.668558] reiserfs: using flush barriers [ 856.716494] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 856.727824] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x7c03000000000000}, 0x2c) 22:24:37 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x149, &(0x7f0000de9000)) 22:24:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2010, &(0x7f0000de9000)) 22:24:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x78, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r2, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) rename(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) 22:24:37 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:37 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x1}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:37 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xedc000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x2400000000000000}, 0x2c) [ 856.971197] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2a03, &(0x7f0000de9000)) [ 857.036331] REISERFS (device loop6): using ordered data mode [ 857.042304] reiserfs: using flush barriers 22:24:37 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8cffffff00000000, &(0x7f0000de9000)) 22:24:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xfc, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 857.081621] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 857.093248] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:37 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xcd020000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:37 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) sched_rr_get_interval(r3, &(0x7f0000000280)) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000005c0)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000380)=""/69) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xd000000}, 0x2c) 22:24:37 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2802000000000000, &(0x7f0000de9000)) 22:24:37 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3ca, &(0x7f0000de9000)) [ 857.240745] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 857.279895] REISERFS (device loop6): using ordered data mode [ 857.285920] reiserfs: using flush barriers 22:24:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1cf, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:37 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1000000}, 0x2c) [ 857.354017] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 857.365376] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:37 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000240)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r2, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) rename(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) 22:24:38 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe3030000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:38 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8cffffff, &(0x7f0000de9000)) 22:24:38 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x32a, &(0x7f0000de9000)) 22:24:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x4000000}, 0x2c) 22:24:38 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x4b, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:38 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000280)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) r2 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0xffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x18a, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xc}, 0x2c) 22:24:38 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x149, &(0x7f0000de9000)) [ 857.766898] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:38 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3, &(0x7f0000de9000)) [ 857.864643] REISERFS (device loop6): using ordered data mode [ 857.870636] reiserfs: using flush barriers 22:24:38 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8cffffff, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:38 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev_mcast\x00') sendfile(r3, r4, &(0x7f0000000000)=0x2000000, 0x2b428a52) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r8, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) clock_gettime(0x0, &(0x7f0000000bc0)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000000b80)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f00000005c0)=""/124, 0x7c}, {&(0x7f0000000280)}], 0x3, &(0x7f0000000a80)=""/232, 0xe8}, 0xffff0000000}], 0x1, 0x10001, &(0x7f0000000c00)={r9, r10+10000000}) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r11, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r11, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 857.941479] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 857.952782] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x2}, 0x2c) [ 858.134504] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 858.163764] REISERFS (device loop6): using ordered data mode [ 858.169764] reiserfs: using flush barriers [ 858.189862] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 858.201298] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r2, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) rename(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) 22:24:38 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8cffffff00000000, &(0x7f0000de9000)) 22:24:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x9c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:38 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3603, &(0x7f0000de9000)) 22:24:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x700000000000000}, 0x2c) 22:24:38 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c00, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:38 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) [ 858.341427] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x9000000}, 0x2c) [ 858.381631] REISERFS (device loop6): using ordered data mode [ 858.387615] reiserfs: using flush barriers [ 858.417938] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 22:24:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x11a, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:38 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa000000, &(0x7f0000de9000)) 22:24:38 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2010, &(0x7f0000de9000)) [ 858.429639] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:38 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1000000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:38 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xd00}, 0x2c) 22:24:38 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)="72656973657266737f", &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1200}, 0x2c) 22:24:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x70, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r2, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) rename(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) 22:24:39 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x10, &(0x7f0000de9000)) 22:24:39 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfeffffff, &(0x7f0000de9000)) 22:24:39 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xb}, 0x2c) 22:24:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x7, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:39 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda00000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:39 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000240)={'yam0\x00', {0x2, 0x4e22, @broadcast}}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r5, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r5, 0xa, 0x25) sendmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 859.253093] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:39 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x20000000, &(0x7f0000de9000)) 22:24:39 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2, &(0x7f0000de9000)) 22:24:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x82, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 859.306354] REISERFS (device loop6): using ordered data mode [ 859.312325] reiserfs: using flush barriers 22:24:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xffffffe4}, 0x2c) [ 859.368851] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 859.380195] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:39 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff0100000000000000000000000013caa24ba7acd3d9ba8c1f540001e000000100000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000240)={0x58c3, 0x6, 0x1, 0x2, 0x6244}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:39 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:39 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1400000000000000}, 0x2c) 22:24:39 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfffffffe, &(0x7f0000de9000)) [ 859.548201] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 859.604961] REISERFS (device loop6): using ordered data mode [ 859.610880] reiserfs: using flush barriers [ 859.686752] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 859.698026] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r2, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) rename(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) 22:24:40 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3603, &(0x7f0000de9000)) 22:24:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x13d, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:40 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xca03000000000000, &(0x7f0000de9000)) 22:24:40 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2a03000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1200000000000000}, 0x2c) 22:24:40 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)="726569736572667304", &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:40 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000004c0)=0x800, 0x4) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000003c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f0000000280)=@req={0x28, &(0x7f0000000240)={'nr0\x00', @ifru_hwaddr=@local}}) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000103000000e600000000ff010000000000000000000000000001f900000100000000000000000000000000000000000000000a00000000200000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xe0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x13000000}, 0x2c) 22:24:40 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xbd01000000000000, &(0x7f0000de9000)) 22:24:40 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x10, &(0x7f0000de9000)) 22:24:40 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:40 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xbd010000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:40 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="b800000019000100e8d395b1aafc39914d0d5f5100000000000087c890345aab8f2100000000000000000001e0bee9c7aceb2c6c480000000000000000000000988a74bb595062d23db6e140fb09e7fd", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x107, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 860.195921] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 860.228956] REISERFS (device loop6): using ordered data mode [ 860.234967] reiserfs: using flush barriers [ 860.273757] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 860.286552] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device [ 860.351089] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 860.366522] REISERFS (device loop6): using ordered data mode [ 860.372514] reiserfs: using flush barriers [ 860.385532] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 22:24:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r2, &(0x7f0000002000), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) rename(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00') write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f757024636772ef000000000000000000000000000000000000000000000000"], 0x90) 22:24:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x700}, 0x2c) 22:24:40 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe303000000000000, &(0x7f0000de9000)) 22:24:40 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x40000, &(0x7f0000de9000)) 22:24:40 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) socket(0xb, 0x2, 0xffffffff) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1b2, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:40 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe303, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 860.396830] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:40 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:40 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x13}, 0x2c) 22:24:40 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe303, &(0x7f0000de9000)) 22:24:40 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b, &(0x7f0000de9000)) 22:24:41 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8cffffff00000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:41 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0x7, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff0100000000000000000000ed000001e000000100000000000000000000000000000000000000000a000000000000008878b46a6aa7ece8bba3234c6f05f24d15", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xe00000000000000}, 0x2c) 22:24:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x11, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 860.686325] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3e3, &(0x7f0000de9000)) [ 860.756733] REISERFS (device loop6): using ordered data mode [ 860.762705] reiserfs: using flush barriers [ 860.812082] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 860.829035] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) 22:24:41 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2cd, &(0x7f0000de9000)) 22:24:41 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x19c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1800000000000000}, 0x2c) 22:24:41 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x36030000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda000000, &(0x7f0000de9000)) 22:24:41 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0xffffffffffee, 0x4000000000) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000240)=@hci={0x1f, 0x0}, &(0x7f0000000380)=0x80) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@mcast2, 0x69, r5}) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r4, &(0x7f0000000940)=""/130, 0x82, 0x40000000, 0x0, 0x0) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000005c0)=@assoc_value={r1, 0x20}, &(0x7f0000000600)=0x8) [ 861.104879] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xb000000}, 0x2c) 22:24:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4000000000000000, &(0x7f0000de9000)) 22:24:41 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xca030000, &(0x7f0000de9000)) [ 861.147431] REISERFS (device loop6): using ordered data mode [ 861.153389] reiserfs: using flush barriers [ 861.165173] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 861.176407] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:41 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_crypto(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000030}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=@del={0x130, 0x11, 0x20, 0x70bd25, 0x25dfdbfb, {{'sha384\x00'}, [], [], 0x2000, 0x2000}, [{0x8, 0x1, 0xffffffffffffff01}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0xfffffffffffffffd}, {0x8, 0x1, 0x8000}, {0x8, 0x1, 0xfff}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x4}]}, 0x130}}, 0x880) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 22:24:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x198, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:41 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x200000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x12000000}, 0x2c) 22:24:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2010000000000000, &(0x7f0000de9000)) 22:24:41 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:41 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x40000000, &(0x7f0000de9000)) 22:24:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x113, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:41 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1100}, 0x2c) 22:24:41 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf0ffffff00000000, &(0x7f0000de9000)) 22:24:41 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)="726569736572667303", &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:42 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2010, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:42 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) 22:24:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x131, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:42 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x20000000, &(0x7f0000de9000)) 22:24:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xe00}, 0x2c) 22:24:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 22:24:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xca030000, &(0x7f0000de9000)) 22:24:42 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:42 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x600}, 0x2c) 22:24:42 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xca03, &(0x7f0000de9000)) 22:24:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x4c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:42 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1400}, 0x2c) [ 862.341439] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 862.381414] REISERFS (device loop6): using ordered data mode [ 862.387395] reiserfs: using flush barriers 22:24:42 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3f00, &(0x7f0000de9000)) 22:24:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x10c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:42 executing program 3: r0 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000006c0)={r2, 0x3f}, 0xfffffffffffffffc) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r1, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:42 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x336, &(0x7f0000de9000)) 22:24:42 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 862.489211] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 862.500477] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:42 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x40000000000000}, 0x2c) 22:24:42 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3e3, &(0x7f0000de9000)) [ 862.744009] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 862.793839] REISERFS (device loop6): using ordered data mode [ 862.799735] reiserfs: using flush barriers [ 862.855385] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 862.866663] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x3f, 0x0, [{}, {}, {0x0, 0x67, 0x0, [], 0x1ff}]}}) 22:24:43 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x300000000000000, &(0x7f0000de9000)) 22:24:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x146, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xc000000}, 0x2c) 22:24:43 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000280)=0x5) 22:24:43 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf0ffffff00000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:43 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffff7f00000000, &(0x7f0000de9000)) 22:24:43 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfsp', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:43 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x2000000}, 0x2c) 22:24:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x60, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:43 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3f00000000000000, &(0x7f0000de9000)) 22:24:43 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000280)={&(0x7f00003c7ff4)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x20000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) userfaultfd(0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:43 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e000000, &(0x7f0000de9000)) 22:24:43 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:43 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xa000000}, 0x2c) 22:24:44 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfffffff6, &(0x7f0000de9000)) [ 863.633727] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:44 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1020, &(0x7f0000de9000)) 22:24:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x105, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 863.749644] REISERFS (device loop6): using ordered data mode [ 863.760180] reiserfs: using flush barriers 22:24:44 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000280)) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000940)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d8f117fd63f34a48780485b6288dd6829b5f2053f7dafc1f69a7e38de683b9c5de364ddcbaa5185ca9f3ee839e4a1f5711fd18672a369bb0e040618d55105f475fba693b6a75d63f8cd82c54e2146c10f0ac54ec63312ef81dc8b1ebd0"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="73797a31f8fe9e628fe7f9d1e5d499389b50600272ecee9679"], 0x19) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xf}, 0x2c) 22:24:44 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa00000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 863.821086] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 863.832362] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:44 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x5f00000000000000, &(0x7f0000de9000)) 22:24:44 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa00, &(0x7f0000de9000)) 22:24:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) [ 863.991968] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 864.011305] REISERFS (device loop6): using ordered data mode [ 864.017268] reiserfs: using flush barriers 22:24:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x121, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x7000000}, 0x2c) [ 864.085892] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 864.097186] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:44 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfsn', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:44 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2cd, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:44 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x80010000, &(0x7f0000de9000)) 22:24:44 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e000000, &(0x7f0000de9000)) 22:24:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:44 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000280)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) ioctl$TCXONC(r0, 0x540a, 0x2) 22:24:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x5, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xf000000}, 0x2c) 22:24:44 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e, &(0x7f0000de9000)) 22:24:44 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:44 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e00, &(0x7f0000de9000)) 22:24:44 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x7c030000}, 0x2c) 22:24:44 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3603000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x4d, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:44 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c00, &(0x7f0000de9000)) 22:24:45 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000940)={0x7, 0x0, [{0xc0000005, 0x401, 0x883, 0xf2, 0xffffffffffffffff}, {0xc000000b, 0x31, 0x1, 0x2a, 0x7}, {0x0, 0x77f, 0x7fff, 0x3, 0x3}, {0xa, 0x9, 0x3, 0x4, 0x200}, {0x1, 0x0, 0xdd, 0xfcd, 0x7f}, {0xc0000001, 0x2230, 0x0, 0x9, 0x7}, {0x7, 0x4, 0x1, 0x9, 0x4}]}) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000240)={0x33, 0x15, 0x10, 0x8, 0xa, 0x8, 0x2, 0x34, 0xffffffffffffffff}) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r6 = accept4$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14, 0x800) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000a00)={0x10000, 0x6, 0x8, 0x0, 0x0, [{r0, 0x0, 0x7}, {r3, 0x0, 0x7}, {r5, 0x0, 0x10000}, {r5, 0x0, 0x7fff}, {r4, 0x0, 0x1}, {r3, 0x0, 0x2}, {r3, 0x0, 0x7}, {r6, 0x0, 0x9}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000280)={0x0, r0, 0x5, 0x4, 0x2, 0x7}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r7, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c00000000000000, &(0x7f0000de9000)) 22:24:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x3000000}, 0x2c) [ 864.755258] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x46, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:45 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x10000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) [ 864.853346] REISERFS (device loop6): using ordered data mode [ 864.859351] reiserfs: using flush barriers 22:24:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e00000000000000, &(0x7f0000de9000)) 22:24:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x2400}, 0x2c) 22:24:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c, &(0x7f0000de9000)) 22:24:45 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 864.935984] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 864.947329] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x200000000000000, &(0x7f0000de9000)) 22:24:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xd0, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xd}, 0x2c) [ 865.116007] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 865.201003] REISERFS (device loop6): using ordered data mode [ 865.206940] reiserfs: using flush barriers [ 865.290866] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 865.302236] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:45 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xca03000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xcd02000000000000, &(0x7f0000de9000)) 22:24:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x9}, 0x2c) 22:24:45 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000d40)=0x4000) execveat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000a40)=[&(0x7f0000000280)='\x00', &(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)='syz0\x00', &(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)='\x00', &(0x7f0000000940)='\x00', &(0x7f0000000980)='cgroupmd5sumproc\x00', &(0x7f00000009c0)="1e7d6264657676626f786e65743100", &(0x7f0000000a00)='syz0\x00'], &(0x7f0000000c80)=[&(0x7f0000000ac0)='selinuxposix_acl_access-*\x00', &(0x7f0000000b00)='encrypted\x00', &(0x7f0000000b40)='\'cpuset)\\*\x00', &(0x7f0000000b80)=',keyringppp0lo\x00', &(0x7f0000000bc0)='\x00', &(0x7f0000000c00)='encrypted\x00', &(0x7f0000000c40)='syz1\x00'], 0x100) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) link(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:45 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)="7265697365726673a0", &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x22, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa0030000, &(0x7f0000de9000)) 22:24:45 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x4000000000000000}, 0x2c) 22:24:45 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x10000000, &(0x7f0000de9000)) 22:24:45 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x151, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:45 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2c000000, &(0x7f0000de9000)) 22:24:46 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffffff00000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1000000, &(0x7f0000de9000)) 22:24:46 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:46 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_netdev_private(r6, 0x89fd, &(0x7f0000000240)="624653d1af34b07acaefe23cc7c0a0aa") r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x600000000000000}, 0x2c) 22:24:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x1c, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x3a0, &(0x7f0000de9000)) 22:24:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xda00000000000000, &(0x7f0000de9000)) [ 865.873158] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:46 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfeffffff, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x900000000000000}, 0x2c) 22:24:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x16, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 865.950321] REISERFS (device loop6): using ordered data mode [ 865.956256] reiserfs: using flush barriers [ 865.978616] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 865.989918] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4000000000000, &(0x7f0000de9000)) 22:24:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4901000000000000, &(0x7f0000de9000)) [ 866.149735] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:46 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setitimer(0x2, &(0x7f0000000240)={{}, {0x0, 0x2710}}, &(0x7f0000000280)) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x100000000000000}, 0x2c) 22:24:46 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4901, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 866.217885] REISERFS (device loop6): using ordered data mode [ 866.223840] reiserfs: using flush barriers [ 866.286181] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 866.297752] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:46 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xd1, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xffffff7f, &(0x7f0000de9000)) 22:24:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2a03, &(0x7f0000de9000)) 22:24:46 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x1000000000000000}, 0x2c) 22:24:46 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4000, &(0x7f0000de9000)) 22:24:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x147, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:46 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000940)={0x4800000000, 0x6, 0xc7, 0x7d1, [], [], [], 0x1, 0x3, 0x6, 0xfffffffffffffff8, "9a00e2c2db6830ec7edb340b9d5f1986"}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) [ 866.540029] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:46 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x6e00, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0xe4ffffff}, 0x2c) [ 866.600452] REISERFS (device loop6): using ordered data mode [ 866.606425] reiserfs: using flush barriers [ 866.627983] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 866.639245] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa00000000000000, &(0x7f0000de9000)) 22:24:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xedc000000000, &(0x7f0000de9000)) 22:24:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x24000000}, 0x2c) 22:24:47 executing program 5: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) [ 866.820556] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 866.876562] REISERFS (device loop6): using ordered data mode [ 866.882524] reiserfs: using flush barriers [ 866.965233] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 866.976457] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:47 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)="726569736572667303", &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x16b, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:47 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000003c0)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:47 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x10, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xedc000000000, &(0x7f0000de9000)) 22:24:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0xffffffe4]}, 0x2c) 22:24:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8001000000000000, &(0x7f0000de9000)) 22:24:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x1200000000000000]}, 0x2c) 22:24:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x36030000, &(0x7f0000de9000)) 22:24:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xce, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x20100000, &(0x7f0000de9000)) 22:24:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:47 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x4, 0x428, [0x0, 0x20000940, 0x20000a60, 0x20000c48], 0x0, &(0x7f0000000280), &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x13, 0x8, 0x893f, 'veth1_to_bridge\x00', 'gretap0\x00', 'ip6gre0\x00', 'ip_vti0\x00', @random="fd191816155b", [0xff, 0x0, 0xff, 0x0, 0xff], @dev={[], 0x1e}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xcbe1e708ca61d1ec], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'ftp-20000\x00'}}}]}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0xb, 0x11, 0x0, 'vlan0\x00', 'sit0\x00', 'gretap0\x00', 'veth0_to_bond\x00', @remote, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @remote, [0xff, 0x0, 0xff, 0xff], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18, {{0x0, 0x0, 0x3, 0x2}}}]}}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffe}}}, {{{0x1b, 0x12, 0x0, 'bond0\x00', 'veth1_to_team\x00', 'bridge_slave_1\x00', 'yam0\x00', @random="5f5c3fbc8ca0", [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0xa8, 0xa8, 0xd8, [@realm={'realm\x00', 0x10, {{0xfffffffffffffffd, 0x0, 0x1}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x7, 0x9, 0x0, 'bond0\x00', 'ip6_vti0\x00', 'team0\x00', 'bond0\x00', @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x1f}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xa0, 0xa0, 0xf0, [@state={'state\x00', 0x8, {{0x4}}}]}}, @common=@log={'log\x00', 0x28, {{0x4, "1fdcd6a00b06f9eec4a11d17fb90d8e5bf64a981c8b9c20023bd7b301fa1", 0x6}}}}]}]}, 0x4a0) r1 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000006c0)={r2, 0x3f}, 0x8) r3 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r3) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000600)={r5, r6/1000+10000}, 0x10) ioctl(r4, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r1, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000f00)=ANY=[@ANYBLOB="b80000001900010f00000000000000f7fe010000000000000000000000000000000000070000200000000a00000000000000562228a0fa0d3de2043909123522d9782eca1f2f6e5a16580f54be6206775f0295db20b55844b89e5d111c768654005a508ef9ca8b4ac85043ace11ac2383eff53b87c1029a5505b286e1c3fc2ca9b3afed9d032c752a6b8e76cba2e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f940a4cf82df57f7e4f2ace08bcca210b74ba6ffb54508f8c3ba8bf95f40a851ef40132ba538bdd975c3d484ea6f249231c23df7cdc78db89d3c6282b98f5f52200c26f2a6970c8533b4766e71a1a48d0473ead2ca708c252556f6fd19071170dfe9cf9bfc0e6a5c"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r9 = socket$nl_route(0x10, 0x3, 0x0) personality(0x440000b) ioctl(r9, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r10, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r10, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:47 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs6', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:47 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:47 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1000000, &(0x7f0000de9000)) 22:24:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x1000000000000000]}, 0x2c) 22:24:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8c010000, &(0x7f0000de9000)) 22:24:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x8e, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:47 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x500000000000000]}, 0x2c) 22:24:48 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:48 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e23, 0x1f, @dev={0xfe, 0x80, [], 0xf}, 0x800}, {0xa, 0x4e22, 0x2, @empty, 0x7fffffff}, 0x0, [0x0, 0x6, 0xffff, 0x6, 0x100000001, 0x6, 0xfffffffffffffff8, 0x5]}, 0x5c) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000940)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2000, &(0x7f0000de9000)) 22:24:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:48 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x80010000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 867.770919] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xf6ffffff, &(0x7f0000de9000)) 22:24:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x8000000]}, 0x2c) 22:24:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x103, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 867.819858] REISERFS (device loop6): using ordered data mode [ 867.825829] reiserfs: using flush barriers [ 867.851517] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 867.862750] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2010000000000000, &(0x7f0000de9000)) 22:24:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x7c030000]}, 0x2c) 22:24:48 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) write$P9_RCREATE(r0, &(0x7f0000000240)={0x18, 0x73, 0x1, {{0x48, 0x0, 0x7}, 0x9}}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x4b, &(0x7f0000de9000)) 22:24:48 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x336, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x59, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) [ 868.122082] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 868.187871] REISERFS (device loop6): using ordered data mode [ 868.193783] reiserfs: using flush barriers [ 868.232175] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 868.243406] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:48 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x40000000]}, 0x2c) 22:24:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getgroups(0x2, &(0x7f0000000280)=[0xffffffffffffffff, 0xee01]) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x3a8, 0x100, 0x100, 0x200, 0x100, 0x0, 0x310, 0x310, 0x310, 0x310, 0x310, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x7fff, [0x20, 0x260, 0x8, 0x6400000000000000, 0x6], 0x8f6, 0x3, 0x2}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@broadcast, @local, 0xffffffff, 0x0, 'syzkaller0\x00', 'syzkaller0\x00', {}, {}, 0x88, 0x3, 0x60}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x1, [0x4, 0xff, 0x70, 0xf9, 0x9], 0xa13, 0x3, 0x400}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@unspec=@owner={0x38, 'owner\x00', 0x0, {r1, r2, r3, r4, 0x4, 0x1}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x7f, 0x9, 0xfffffffffffff001, 0xfff, 0x5, 0x1ff, 0x7, 0x6]}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) 22:24:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x180, &(0x7f0000de9000)) 22:24:48 executing program 3: syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x10000) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe15b269000000000000000000000000000000000000000000001f00000000000000000000000000"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsync(r0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0xc6, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:48 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x1fffff, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) [ 868.489868] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:48 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0xe00]}, 0x2c) 22:24:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:48 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x28020000, &(0x7f0000de9000)) 22:24:48 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) r0 = memfd_create(&(0x7f00000001c0)='/dev/full\x00', 0x1) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x18) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40000, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000140)={0x10, 0x0, {0x53, 0xc3b5, 0x4, {0x0, 0x1f}, {0x4, 0x6}, @period={0x5f, 0x5, 0x1, 0xc9d, 0x8, {0x7, 0x2, 0x1, 0xffffffffffff8001}, 0x2, &(0x7f0000000100)=[0x8, 0x3]}}, {0x53, 0x3, 0x80, {0x4, 0x3ff}, {0xfff, 0x10000000}, @const={0x1, {0x8000, 0x110, 0x5, 0x8000}}}}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000040)) [ 868.548195] REISERFS (device loop6): using ordered data mode [ 868.554180] reiserfs: using flush barriers 22:24:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x150, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 868.629521] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 868.640811] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:49 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x8001000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x4000]}, 0x2c) [ 868.749600] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 868.804798] REISERFS (device loop6): using ordered data mode [ 868.810773] reiserfs: using flush barriers [ 868.816830] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 868.828604] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:49 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:49 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000940)="77657374776f6f700017c0273b673b530c7d9911084249d42df341c8bb04dd36a0ab8e5a38dad1846d4bfcdaffc903e3417bd884a2ed28f5184935fe88867bb2557248ca6321e845ff02ffd4b02f05c254d16cc89cdd00c2d96da5b6e45f29e9da1a17d639156557572bfb2fbe9f1273140d4e4fb0a764ff214cee0a45daeb0555318c4ccf7259aee8fc520c47d926bc08b35e39dc74999ed662", 0x9a) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x2) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b80000001900010000000000000000004ad5f7d3000000000000000000000001e000000100000000000000000000000037038c6095cea7d9c000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote, 0x0, 0x0, 0x3}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = geteuid() mount$9p_unix(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='9p\x00', 0x2001004, &(0x7f0000000a00)={'trans=unix,', {[{@access_uid={'access', 0x3d, r7}}, {@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@version_9p2000='version=9p2000'}, {@mmap='mmap'}, {@noextend='noextend'}, {@uname={'uname', 0x3d, 'cifs.idmap\x00'}}, {@version_9p2000='version=9p2000'}, {@access_any='access=any'}]}}) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r8, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000380)=0x7, 0x4) getpeername(r8, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) get_thread_area(&(0x7f0000000280)={0x5, 0x20000800, 0x400, 0x10000, 0x9, 0x81, 0x2, 0x5}) 22:24:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x600000000000000]}, 0x2c) 22:24:49 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xcd02000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:49 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1}) bind$can_raw(r0, &(0x7f0000000080), 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000de9000)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x10000, 0x0) 22:24:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xe3030000, &(0x7f0000de9000)) 22:24:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x12e, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) [ 869.190623] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal 22:24:49 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x11, 0xffffffffffffffff) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000000040)="832f1a494e48f427d45f4f54a351394b5f5935469ddc6bc027ffd2c762925f19051b5b19f36d98091639e531adef654df5db2304dbc86a109f409a7d92c7855e81d5c35c") [ 869.247977] REISERFS (device loop6): using ordered data mode [ 869.253989] reiserfs: using flush barriers 22:24:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x1000000]}, 0x2c) 22:24:49 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xcd02, &(0x7f0000de9000)) 22:24:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x173, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 869.343596] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 869.354871] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:49 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2000000000000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:49 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0xb000000]}, 0x2c) [ 869.554894] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 869.608707] REISERFS (device loop6): using ordered data mode [ 869.615163] reiserfs: using flush barriers [ 869.680714] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 869.691960] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:50 executing program 6: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="00080000ec0500006d8a2b001200000008080000b90200000001000084811f4ce10000001e000000000000000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x8000, &(0x7f0000013900)) 22:24:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$KDSETMODE(r0, 0x4b3a, 0x7f) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x0, &(0x7f0000000000)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001800)='/dev/snapshot\x00', 0x121082, 0x0) r2 = getuid() getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f00000000c0)="49a28de2a876de43408672b283bd61e44245ba9b706ecb87fe540b034a8b87b5eb6da7f0fc424ad7f8da6c5a108157436cd04d33c602c78216fa495224fd69b779ea28dd1a9195c4f06e67a597e846e812fe97cde1460dd858174ed30ab63952b70542ca442997e8cdabc10561", 0x6d, 0xc76}, {&(0x7f0000000140)="e446e65271979fcab2cdd6e48a92d71493726e610dc4e6ee350c93343c2d553d79e65e69ce143e0cd2f1defe12962c80040b950aaa1cb3641f83ba4ea44972891c1369538af008ff9eeb794b20b293f11acfbb97f04f886329af0670e191042cf09c7726c88d4934fe1e20bc70347976558185f3aabeb4857b290f8bbd349a5b2a0f752ac683e225ba4578ca", 0x8c, 0xfffffffffffffffe}, {&(0x7f0000000200)="1fd1299c87c7ad6a6185dfdc8edb85ff13dfa7822303e12f4576788613ff6c1e6144955e39d8862eddf2137ff754d215faacaabd5148efde53d3bcd11ec9652113b2cbc7", 0x44, 0x3}], 0x280000, &(0x7f00000003c0)={[{@sbsector={'sbsector', 0x3d, 0x7}}, {@uid={'uid', 0x3d, r2}}, {@check_relaxed='check=relaxed'}, {@utf8='utf8'}, {@map_off='map=off'}, {@gid={'gid', 0x3d, r3}}]}) sendmsg$xdp(r1, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000001840)="e29d615e7472a581abfa4efb40cd8fa477880b055881a04c572956188b84c2f5889e0958f9f305ea471a8785b2e79ff43e601abfb9b420701a9fa69509518fbb42581afb6fefcdc55b102588b5a727a7ace8f001584240d4d3cbc6fdcdcd8e68dff449a44ff6ea7c38260a9761f5b9768f620870478a1ce8b5aad1a3b2228ca186d2e7f635f356f66c230441a0a7130bfca162ce6de0791c01238d3de38b84c4768d9635083f57fb72a6887e513a16c2f4c5a1ded0d59a5e396ab11678c4270f1d1f317962", 0xc5}, {&(0x7f0000001940)="2d4ef9c5279f663b4ee14e2a92ed71160caff8b8b90b5060f508e3492c27bd81d35059a58bd2535fc81b99f4a61c115d6317d78e2ac9488d77f185e25089a98e9003dd4162dae209d43a6776a12049915d71bfc8e68ae46e58efceb5b68b0b53c6ec9768ef18891f93a82e30e8ea8e9f1f895f20664709f4a78b77e77881f0ac5ccfae4b359a8f80b2b4489d4c8393058ed2f9a52aeaabd3eddc8c961267c005efdbd7af79e60500a5b54cc354a31e788c5fcb776b9a28f8e57cf4fb21127e81342ff969f0", 0xc5}, {&(0x7f0000001a40)="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", 0x1000}, {&(0x7f0000002a40)="5bf6b585a1d24c0159b5238ad7767caa36384f66a42da004b2634c7497db68e10575fdd191ef4aeb10a086f4d8c9e4ae8fe4b32404a8a979062f382ecdd47813e318c5c7a60f3283142f5f9fc26b74f3db25f0d5e79a86414b33e2a84c31460672dd9be9bf33242ab742de33c2ac8ecac763ab16886be846c638ea3f53fc3dc1a8972a92c0f78a4f8360ee321c9e9f012c8eba375b711893ab55cb2d9e0fb4d92abfb89ec03f1df1f7fae40dcaf41110", 0xb0}, {&(0x7f0000002b00)="47f11e3a5655ca713196e2807a2fd6407a8dc8f2a26ffd67406f132cf45cd9c1e5970235637feae086182f4522fa2f93c1", 0x31}], 0x5, 0x0, 0x0, 0x40000}, 0x4000000) 22:24:50 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xa, &(0x7f0000de9000)) 22:24:50 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040)}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000000)={0x0, 0xff97, &(0x7f0000000080)}) 22:24:50 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) write$cgroup_int(r0, &(0x7f0000001680)=0xc6a5, 0x12) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000001800)={0x0, 0x0, 0x0}, &(0x7f0000001840)=0xc) lchown(&(0x7f0000001700)='./file0\x00', r6, r7) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r5, 0x118, 0x1, &(0x7f0000001940)=0x9131, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001900)={r0, 0x50, &(0x7f0000001880)}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r8, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) sendmmsg$inet_sctp(r0, &(0x7f0000001580)=[{&(0x7f0000000240)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000380)="388f2f6b778fb1b3d5d47e1da8e90b197b1de05903e8b818c0d4c54ba0fce61f64f006e06cf46bb3bea0fff8f5d893ca851efd310d994a8b38e6d36039eacd38d4fea8f940feeee8dd1a1cfeca5f8ebb1a4ab31c05ef59150755efcb0a44439a3cef7d3ff0ad18627fa5b598449b84b9733118b9f7944f38ccf5afe9", 0x7c}, {&(0x7f0000000940)="6976b0784fc636b2e58cbb5eae7943587773a9a559d4195072299d92e83958a775e0e669afe2f4b226d78f5775b49b4cee2fb4c85eb25115fa49d53ca852482515ca35265c4682e8162042e3fe4f7d772cf8c68fa52156fbce7d4032c2cc5dd76da2d334a120cc7e381543f4c512cb80eecb7cfe9b128790d89f151fae61049b30e51df09eaf2e44fd609550d807f6ff88a524331739ff3e8e", 0x99}], 0x2, 0x0, 0x0, 0x40d4}, {&(0x7f00000005c0)=@in6={0xa, 0x4e21, 0x1f, @ipv4={[], [], @multicast1}, 0x8}, 0x1c, &(0x7f0000000e80)=[{&(0x7f0000000600)="2f2ff964f35f53c6", 0x8}, {&(0x7f0000000a00)="1818bfb91c8ef1be71d0572666703900acdbc1d6ab920bb273f2b1d282eb934b4f6a330080847f59ec07e2f1aa00a53b8c88edb6ddbd76c07f02bf0d7fafb2ca00d7980df9e8f0b1689d47ad5124de206e8cb71129a9ab5343217a56eb203258bc3d9b1fb6db1e38e02df1923cdbf7ac57d40e1d8e5974894c7cf3f10999ca7aedf2fb0baea94d082d853eb41041731dbcfe7b789a0ffa7f3b163e6cda9df47107a3327d617eb1d6a2b159a829662d6c9bf191c42bf1181e1259148785b1fa4b6405723eec824d1dcc0fce6a557010fcf06e583338ef08185fa2b6dc81a50db534a91a532fa50da96f8de2022b018927fd", 0xf1}, {&(0x7f0000000b00)="15856a020b45a4de5871171951590d3c0bdefbbd7b2d1b37a37c4e3ecb9f16f05a5640f6d160ed08e756d1e7c9b260b09654c93bf4bd8c6ecfb3dcee7b04672a08c5cb247b3f0b6cd2f88b6d99a63f478eb6d5b34e544a88de0bb0bd4c158c107ee15922db7fa07245554a64dd0f5769d12d28740be2ff3cc50a072622b2d244f10f81e6627c7b69e0107ccca5c5ba", 0x8f}, {&(0x7f0000000bc0)="d3279d100e06ef250ac2915fca26bff0bb9755e772a335b704d777260348b9d927135352f6aec0e4c6aeb744e43140c5669bd7584c8398c3570b5ae0937380e839e08d650d410edde537020f46addaaee63ecb73329645f4c69bf3f91211b03c32886c7f4458694582a2fb0883b2ea4c16fb02e417126117a44ccd0860136984db973583fa1120ddf4839eaa29f9235cba3fff59ac133928412b7d82c9ffac41325e36f55a06123cff8fd025573217f89e83d790", 0xb4}, {&(0x7f0000000c80)="8331a4aa837bff7c41d9a62f8d913bd6b968aa78b279daaaab3e97e605adb348aadca4e2a2d564d4452c0dd21793abd6c7d8b68e4b11b8d02d156439dae7fd93d1beb19d53758ce5d3c5758edad26a5e6d14e1b5b7592db37130714ae71d13cd146fd5bc8d92376234b8d9ac48bd84b95087dbe3f7e6b2ba59e383d26796737105ab04f80773827f50f7a184d3b8853e16d59f4fb8b1b4a2910f42ae6ad9e201331777b0b2f00242b988583446f8f8714b", 0xb1}, {&(0x7f0000000d40)="3ab9aff78e8a4a4b2c07a89683c443e2761302acb62f4ccbc7d2a59671ba8a7dd1b969f9f2d79575f3b648dd0e98a58eeecf03af9c37", 0x36}, {&(0x7f0000000d80)="075dcb687a7d8e9952276df12233e4303b77969811e393e10c4405cf7186479dab2c461e2ab4af332dd281a18f92c744a93bd235192f2a80c3c90b8717b58a39556132c8eaeb262ae3ae42ec552e9c6d03a47881b4be1daa9d57fd71696782dfa02e98746b62859aa01958dcb7ed99919a0a1aded731659f4e4e5e987441270624983c679bac1f209208a21e47e11512fb87c75ef7ffa6d240c0073d1c8c870bf8de4a95af370fb32a1ab946c7715f7887e75033ef1f26516cf47d6c08566537dfbe78e0d1273dda09107c17c1337420ae1cb99c2e294f2cad61bcf8b168b1", 0xdf}], 0x7, &(0x7f0000000f00)=[@sndinfo={0x20, 0x84, 0x2, {0x6, 0x8202, 0x4, 0x3ff, r1}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x400}}], 0x38, 0x40000}, {&(0x7f0000000f40)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000f80)="656d9dbbbbef01566536dd14c8b7babd9c42a09043587f4158fb003532950b136d5e792c35e355f623ae1f6df304ab7470c939ae0e4601132d52a7667841989761fba3f9ff7f94f1bdad7bc3af3089620505b631764af79d072f1e1b18d4", 0x5e}, {&(0x7f0000001000)="94c91e2b45f09740dcde51c8290844b3d80d0bd14b8411775002c2676c766474eee82a8f329e26cfb5351d5179d86b32f1c0e6dfdbdd676ee8ad07a0a69f198ce6ee535a52aea10300dc09c52130dd39c8af1ffcd246f441fcfa679b47de4b7a0c20696ca072edb50533249413775194ec84c635f36f5d026c83fa0d3d7784e41d1abc5aa55e3f04d4604e8967ef6e89", 0x90}, {&(0x7f00000010c0)="e0dc3bc6bd03632e8e81ff576912a35394a37301ad03a57fe23c44c909ecaa927546513fb44539dc49e0c17fe7068863154527b4130abe2ab46a2f246da1896115c209447cfb85127d221c8f3cbb537827041689c490ac807a15579a757dc89d723a91106227d3c9f1809320b6d000b132fc4fa0ffa7d03401a0bca766e5d43d04f1615f1fc2c09fa85d5041beceed2d6f3e9a367037a234b10453c2a500e1f28da211e75d437a528d1bc2e23fed1192ee7f544740ec0888c65f7d5d8db21e", 0xbf}, {&(0x7f0000001180)="6d3829e007a24f2a675d9672043fec485b646ef213618f0209b98fc0618c08a730ca9871938845f32bd13004d9a0e46210cba3a76db5979db35305e8e45ca4020c8e947d65564154ccf56f45d3c1fc7e58bd0dedfbde6c3e0b99c18bde32516f4d3fa22bfd3053e09f35f532bb4b4911739da8a73e37d3974113aefb7def2b83346d56e924a096dd0147a9ff7e178cbad94cf530fad8160f92d2a6da5a09fdf3b767c3f908b939ccb595f9f9daea65582e299366c85eb0deba384ddd5212a0427555cfe158a2d16a3335c8bbd4444e693ad5b6554370df0d9b62fbb52e9826dc7e849c499d8a4a9a2946eb5907fb85eb8c21a5d81bf0f516", 0xf8}], 0x4, &(0x7f00000012c0)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x8004, 0xffffffffffffff7f, 0x3f, r1}}, @init={0x18, 0x84, 0x0, {0x10000, 0xffffffff, 0x800, 0x2}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x2, 0x1, 0x6, 0x5, 0xfff, 0x80000000, 0x2, r1}}], 0x68, 0x4}, {&(0x7f0000001340)=@in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x7}, 0x1c, &(0x7f0000001480)=[{&(0x7f00000013c0)="3054e8f416878a1e40117e04e3fbab13c231e1d5b998921897ab852992ad5bbe85ee1f44f0b5331c3ef869f6a00af993", 0x30}, {&(0x7f0000001400)="980fea3cb87dae9ea067b915c79f889c76107e9ee6a36c5facaa6dded8a0a4a891a0391f5466b627e5692a68d9a082573b9958a26944355910737e51b2db55ed012a2b9eb608a6bf2bf207482cf51d0460f2c4bb6821a46ec07d9c84cdace5e275aa5c021c45", 0x66}], 0x2, &(0x7f00000014c0)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x4, 0x1, 0x0, 0xbf3, 0x7, 0x2, 0x6, r1}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @init={0x18, 0x84, 0x0, {0x3, 0x1000, 0x5, 0x5}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x4, 0x4, 0x2, 0x7, 0xe861, 0x1, 0x401, r1}}], 0xb0, 0x8000}], 0x4, 0x4080) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000002dc0)=[{&(0x7f0000001980)=@in6={0xa, 0x4e24, 0x4, @loopback, 0x7}, 0x1c, &(0x7f0000001a00)=[{&(0x7f00000019c0)="e5399a1ae3e7219586e651fc28416ec611c8ba03c4f3c003096a29b4644b5b085d55ff0df614ed37d312f06f358b", 0x2e}], 0x1, &(0x7f0000001a40)=[@dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x6}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x3}}], 0x30, 0x1}, {&(0x7f0000001a80)=@in6={0xa, 0x4e20, 0x4e5c, @empty, 0x1}, 0x1c, &(0x7f0000001e40)=[{&(0x7f0000001ac0)="57baea32b95e", 0x6}, {&(0x7f0000001b00)="a4d5dbd37068cfdf1959917f38819c79105989860d9184f68710fab0c7e1107db81a821ee2a338a26d714e9fbcee7343568e54120550b7e95c440bd5120ef0d85278fc1d07ee5b170c0d1a878c2dac0d6215444bdb5c523290cf9a436c82b645fe28de415511a33de14d34f01763ef001cd2136856a4493775735f7939e6d366624275f18a756b118a84a75ea6002fa87da0d983a5fa3894d16102b233a70ac8e8a4f1d3ed64d6ce4ca10b56cba2c583bc87a4edc17faa9e9285a31f213b395476ce16f00a9455521a5402c78948075622090b", 0xd3}, {&(0x7f0000001c00)="04b42a9eacd2882b0a00ff1b472d084d3aee0ec1da7f42015ff398571ff15a071b46ead2525f1c1b09a6f79b11b4aa814f5764", 0x33}, {&(0x7f0000001c40)="336cbb12286c802d4da3fcba9bf6fdfefa69d8e144c9adf2d3de4767e0c720fb9883b6df663e9dd232633a974518c21dc119bbf56c0f7a915dc1d96a5e27c1443ed5116fcd819e01f2f56cc803055ed4aec15315d6dfcd428b68cc94806c93bad23d65b62940ad5fd33e268aec45b9d00acea82a21ff13ced1ed236c5780c06a8c1cca60ea616c3a41dd62bc46e1", 0x8e}, {&(0x7f0000001d00)="53c44a870a14bb759342bf5001e9ee034e80857dfa1fe5f8182dbd92b20b6b913244b31e63d91136be044644c101c0135693537ea4e8a100c07c71df665b4cda5a9b3e1cff08a80938f4f629f072c0f134cf25161a034c46a4f1a5fb322863f0c0b8dc1c42dab9eda5d7ac04448858986327d71ecd", 0x75}, {&(0x7f0000001d80)="9e1b1ed336b3a2c07fec896cc9083c5ab80060936bef2624176a87cd5430df12d3ca6470530d754f3d38e3708544d1b4da13ed238ae7d51a5e0abd2236fe546797c044820f71b5e1ab76f7342e4272577ad5625e3ca71c5ef054e642f08ee73857c899f9508b087c8d6b991e7534e25a2f7db5e25f2d59b7086fc7bc1c6e778e68e1d73ddb55b3c4cb3f9e2aba393cda695749ccbed453ee46fce0f2f6946c29ffc06e9e118391b88946bb023bc2f847c4396d3f60d09358", 0xb8}], 0x6, &(0x7f0000001ec0)=[@authinfo={0x18, 0x84, 0x6, {0x7fdad01}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr}, @dstaddrv6={0x20}, @authinfo={0x18, 0x84, 0x6, {0xffffffffffffffc0}}], 0x68, 0x10}, {&(0x7f0000001f40)=@in6={0xa, 0x4e21, 0x4367b0ba, @dev={0xfe, 0x80, [], 0x20}, 0x9}, 0x1c, &(0x7f0000002200)=[{&(0x7f0000001f80)="c96e478b5ba2a0ff625eda675756a3d60efbb8856311734367cf8f25b32889cef6c24676d174202b4665f5346548958dd3f7a09591cd534c273fdb179f5f61cf4fcf7f3943641e9bf0a6341b096a74ba277a7b25c6c82d9a651b414293da73e7441518320a5d9bc39fa51dd11cf932a51b59592cc887ba3cda0c361000da17", 0x7f}, {&(0x7f0000002000)="141121", 0x3}, {&(0x7f0000002040)="b4d2b58d93b74c2778ef7779212bbc282be908eb29ba419b0217f702a1510ef73cd73ecd5ec311cfc432289c0750f5c9d662aeb5678c031f7d164c8bc6ab712b7c6f581a0260f82ca68964636d2a74c9a1324f7c11c382000f3ca1013c58f1648952406cf5540738be1d6532b88288a6817ff23dc34c2ef018acc5234329e4714fc4fcc06b", 0x85}, {&(0x7f0000002100)="08873510fcb3faaabf7bb136206220ab195763e9658f0b0307f91443284b01051984d5a951", 0x25}, {&(0x7f0000002140)="92d07dc8357f5aeb5d55bb567f07c7c6acacd1a092cc318013d187c4bf10875c56863ed789967ee11f4df3cc528ba253449361e639803a1579477c3467309e84fc1399f57ca005b03c0c2057bd85e02681f967cc0fa470a6630d4f66e83bf882a7bd5668acc87ab74134fc924e81374361bb7d9380c82facc9b251e4c26efad57f51699451", 0x85}], 0x5, &(0x7f0000002280)=[@authinfo={0x18, 0x84, 0x6, {0x8f}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x5, 0x200, 0x401, 0x5, 0xfff, 0x8001, 0x4, r1}}, @sndrcv={0x30, 0x84, 0x1, {0x1088, 0x200, 0x8, 0xb3, 0x1, 0x10001, 0x3, 0xff, r1}}], 0x78, 0x4000040}, {&(0x7f0000002300)=@in6={0xa, 0x4e23, 0x8001, @ipv4={[], [], @broadcast}, 0x78d}, 0x1c, &(0x7f0000002640)=[{&(0x7f0000002340)="f68bb079deac5e87fcdd515132079ce3fef685a03563fdd537c22301c80a100564b7d7c9b5c8a6ee3e021673f6aea66ff81c3fe05b71d46af9d299f34e5e", 0x3e}, {&(0x7f0000002380)="f4d5458e0cebbc0f06c5dc9f3568753be6c559460fe1e48321b6ee240ccaa7fd0c8f55e2afc10bc2863d9a95f9dba105321a1509396ee54cb6325f077c7ca94cd2fbc08a1bef874e3bf43a2b0eb6da9e6ad578c364338e1d0c3815fdd7b3ffe75372cc481ac4ea95eba1efabd6a932af5e4f", 0x72}, {&(0x7f0000002400)="31195bc790d70eb4496cb30873507fc160e73faf81dbc8ce5cfcb74f71e117c3b28b9626d7de7f004442bcbb243ffb8ea2e898b80bc064f2cebfcfe66ebc3a4e9021897b779c136f958165dca074d63f630d0e8c3b33c7ddb25d4c53af464fac394983838f8413624ee60246a27aa8bbc09883a9ee8f260d665816130c5ecc1bf201caac07c2d8bfc55433393f75e47460b65d31c0b52918fb1524c71fc575d85a3e6cd0e18d8a9cafbdc5cbc2249de2dd8dc203d1148241afae1dec916e758e63e9d6840a037101c6975f9d19cc1091a93e1f2258d68a1c8c5da32a4539c7", 0xdf}, {&(0x7f0000002500)="8c96eb5c8b5a23670738815bc03e258bdfeacf5208ca647f0ef760a2d0054c114a71b4473c85b21ad17eb200c8e4", 0x2e}, {&(0x7f0000002540)="60d65b817cfb3130cdb6f48c245f3838af481c3ea9d56d8681e1d8f67fb9b6998270564c5d3c11d46f6d029e646e96bef6373790be946bd46f25e2110f20f5e646e29d57034977d2a82cdff9b22055f20f706c3ebd04fde990a4b1fa1addd7e267f3bb792c65e8f49441a010e2a07e91f7a334d13f5ca9845c6149fc1a83f850653fa8a21125a1a1194e268f8d9c2f37bd00784cd844433c6a541a52cf3e5384b9c569ae32dfbda44ca0c4c248c4d346da62fac6f4164a4cbfb382a369372b570ad71487207768b06d0658ba58ad6c037da919f5f2cad97aa8d097ff8bc8d4bbeb9b9cb0392a908bdc431e47b5064d067062", 0xf2}], 0x5}, {&(0x7f00000026c0)=@in={0x2, 0x4e24}, 0x10, &(0x7f0000002700), 0x0, &(0x7f0000002740)=[@sndrcv={0x30, 0x84, 0x1, {0x9, 0x5, 0x9, 0x80, 0x5, 0xfffffffffffffffc, 0xbdd5, 0x81, r1}}], 0x30, 0x24044040}, {&(0x7f0000002780)=@in={0x2, 0x4e20}, 0x10, &(0x7f0000002a40)=[{&(0x7f00000027c0)="e386b1a02f7873803c32bef147078c61f9a0e0159311dd8f63798ecb99f92caa2bb04f65df0b7043662aafaef435322b685342d0063669141adae1b745b581bb2206f5ee9a66ccff3c464a3bac13b6f7a188bd0361a17c789c083d55edc1952da3a792433e6a03856bc9845189ed027ca262d3c0e17084292d21b6dfd65fdf3cbce3a646cd9fcd0d2260af6ace1f0bc5ee9f6f", 0x93}, {&(0x7f0000002880)="7463221227bb7d2a3ad6da4d50a80542e598e3dbc97433210882dc854c139e726585179ee4a217fb64e49816ec59f07ddea67a5ce2fb056419fd10d651045fc2b71ddd07bdab5a0f6b9b3beb5ce27b0bec94cffcd5f7f28559c5d922bd", 0x5d}, {&(0x7f0000002900)="907bb7bed4cb5dd35f5e31843c93b91e4c1667e0b2e69e8ff07097e8619a7a3dc48eb1ac30854efd9a1c7413e2db78d6954cc87612d3cfda28d50a011998b3eeca4ea12f3a9e613f6c88a1079a8e3553df262c4f5afd7738ba8f2d54644ee5efa1babcbf0eadb288f8b0119f88453ab81e3e795ee090c4b68153a989c2e447a225dee9957c0ffe5691e69686d904accfda6469d48f6cca59f1fc0081550a0936d369ce05cb22d9fc421362472f42bac2be9cc8e7dcd8906ab009f77b26ee156b4d07b9debe3ec43b283853ce9b38cfb607a990dc2276f9293873cc94051c4414482a4aaaf806fcf0f72ef278b9a6e803ea8a8cd8c8a3595c", 0xf8}, {&(0x7f0000002a00)="fb27182e7a2a30123a9b3f5fe27d33b230f3002ec123f04430c5dce1c350b632ddbe3f134587341d3429b95f732d7074e845c27b236a8a720ad8", 0x3a}], 0x4, &(0x7f0000002a80)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x11}}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x8000, 0x80000, 0x100000001, r1}}, @init={0x18, 0x84, 0x0, {0x4, 0x70, 0x4449, 0xfffffffffffffffa}}, @sndinfo={0x20, 0x84, 0x2, {0x6595, 0x2, 0x100000000, 0x7ff, r1}}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x2, 0xfffffffffffffba6, 0xfff, r1}}, @dstaddrv4={0x18}], 0xa8, 0x20044080}, {&(0x7f0000002b40)=@in={0x2, 0x4e23}, 0x10, &(0x7f0000002d40)=[{&(0x7f0000002b80)="fed855d08817b08977ab6312b316386c0aa870ca0f02f3e117289546784ead9e00842083976a154978c133bd0fc8f61564b3930385b58eb54014cd3489755bceaa7ef8bfb49acaf3ab9903c265db98910cb464d7466d85be96c6dbe622a8501196198819ca10aaebf4577c3313d9a8678895a4d5b8015c0b8d0868e9a41036acc736992199f05b304ac8d75f7eceae2b2230f8615c355a84ab5553b3a419c26b7e40ca39160498f4e6b940f11b9373e1afa7498333baaf176deeff1474", 0xbd}, {&(0x7f0000002c40)="5cee216b2a7b2ccbab8e0f6fb4d93293d38025a8de9f3cc61c716d3a9a5f585f78b8fd9d56362199944a0aa66559de99f4f5b5cfafd2d6cff97f695c5831bfe60a33a6992133bfb08efadc3dd3159060622ac83246cd8999069381e1367b821b038fe4a4b3de72492323d1eb54e24036897691efd08d8ee53c388d2c80c4c9a7b55328eebb3cd8832aee0fcad4dd1a527d44a4a73133812ed010efad4cedaf85919708a45b0638e63e657fc9c671ae8119b4f0761d54c637c21a6e81ad454d74e7c66a12d8", 0xc5}], 0x2, &(0x7f0000002d80)=[@sndinfo={0x20, 0x84, 0x2, {0xfffffffffffffffd, 0x1, 0x1, 0x100000001, r1}}, @authinfo={0x18, 0x84, 0x6, {0x4}}], 0x38, 0x4000}], 0x7, 0x1) sendmmsg(r9, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r9, &(0x7f0000000100)=@xdp, &(0x7f0000000440)=0xfffffffffffffd28) 22:24:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x181, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) 22:24:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0x80ffff]}, 0x2c) 22:24:50 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x40000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:50 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe, 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)="646178000365", 0x0, &(0x7f0000000040)) 22:24:50 executing program 5: socket$bt_rfcomm(0x1f, 0x0, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x36200}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000100)={0x28, 0x2e, 0x6fd, 0x0, 0x0, {0x2004}, [@nested={0x14, 0x0, [@typed={0x8, 0x9, @pid}, @typed={0x8, 0x2, @pid}]}]}, 0x28}}, 0x0) 22:24:50 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0xfffffff0, &(0x7f0000de9000)) [ 869.932851] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 869.963644] REISERFS (device loop6): using ordered data mode [ 869.969610] reiserfs: using flush barriers 22:24:50 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x400, 0xff, 0x20, 0xffffffffffffff9c, 0x0, [0xa000000]}, 0x2c) 22:24:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000003280)) clock_gettime(0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x196, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000340)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 870.048614] REISERFS warning (device loop6): sh-458 journal_init_dev: cannot init journal device 'unknown-block(8,8)': -6 [ 870.059888] REISERFS warning (device loop6): sh-462 journal_init: unable to initialize journal device 22:24:50 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x81) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000907ff8)='./file0\x00', &(0x7f0000058ffd)='./file0\x00', &(0x7f0000c77ffa)="646178000365", 0x2000000, &(0x7f0000de9000)) semget$private(0x0, 0x0, 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, &(0x7f0000000280)=""/193) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) 22:24:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x40, 0xffffffffffffffff) r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000700)) syz_open_dev$dmmidi(&(0x7f0000000840)='/dev/dmmidi#\x00', 0x35d, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000880)='/dev/dsp#\x00', 0xffff, 0x80000) r3 = accept4$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14, 0x800) close(r3) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x160, 0x3, &(0x7f0000000340)=[{&(0x7f00000000c0)="5e5a14c8cfb447b77add09c8106cdc62642ef8c2567f7526f30db95e90ebdcb4b61d08694ef1b54fa4ea6373f45b3ad25247f8976e53c4c4803fbff1b67400ed4312b8a39103fedc7e430023a99887347a65ed5e259e1038690c339d6acfcddf1f05651969b5b95cc8393fd8bb602567b5f360f9e7852faedbb475c531d21d7e304b5571d8f9545c470f084070c079284893c3a0b02127", 0x97, 0xc62}, {&(0x7f0000000180)="cbb880b826debda26f11fe396371348e951e465c58db41a60862c12278f614b72f093b3e85b534f27393c1b0c135b160379f950b584434167f5a17b4b638b8b1000d690b9265eb66254bcde19d3f3004e0b281b5ec2a83ef24e49b012f4d5588f26514c5978714bea2898d0af76c68b2217b6e7d1b5aa54fb718c88213311f6f547ffdb45947cefd8a1cbdbfce717ce0e0a7b9808f177fff83a30884306590b349a8c97e8a18127949fb68ce7d73a89a486d222ecd5787e002398978edfb4c84e54a9d327df6c8acc030b99effefaeaa6efb8a642d495c3c7fcc1b6e1d32d9ab7bb5", 0xe2, 0x3ff}, {&(0x7f0000000280)="3ba4a324e59d75851e6a6c84a412ae90fee694447c4b4611f8e4b463ecef88aed938b5c877a405a59bc3c0ffea95fe0487a4c25ab85d6791b1bf88bc2b6e66e226eb50fae41535a807c839d17cecb7483433f5227b7ca2c2556de1f6a1dc56cf01bd547e72db6dc8c4df239decb77c4db0a6494b8f4172e3f30e23887cac5d90564f4ba253c7da633e08f528737ca5e8515df68c1723014681411a930e4e9a94ea75a9ed1c9865f1af54dada7ee4bed986c0c27c", 0xb4, 0x1f}], 0x110010, &(0x7f0000000600)=ANY=[@ANYBLOB='nodots,nodots,dots,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6e6f646f74732c636865636b3d7374726963742c646f74732c00f119a31129af2e28af6e6a612255aeb3a87e1b78f6b0346f1d83c49b56fbbc4c430782a897a96bbf04787a5cb2cf3edc4305e7c26e50c78a9845b76b0623dca858bd"]) shmdt(r0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x10100, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, &(0x7f0000000540)={0x3, 0x7}) mount(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000480)='./file0\x00', &(0x7f0000000740)="2560b8404be9642e850e1eb3ce465f5a83d016a2c3bd2a1ae7106799129264c61a868e15ca0439b330afa8ec4fc39751da854faa8da8b249a0ae619f1ca6cffd41b9c640a4308bbb2300f380f369fded16417230537545a803919715c955", 0x1002, &(0x7f0000000700)) 22:24:50 executing program 3: request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='keyring\x00', 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='\'cpuset)\\*\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000640)={0x200, 0x1, 0x6, 0x31, 0x0}, &(0x7f0000000680)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r1, 0x3f}, 0x8) r2 = request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='\x00', 0x0) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_CREATE(r0, &(0x7f0000000800)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000700)=""/196, 0xc4, 0x9, 0x10001, 0xffffffffffffff7f, 0x82, 0x2}, 0x120) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x21, &(0x7f0000000200)={@remote}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r6, 0x8912, &(0x7f0000001380)="0a5cc80700315f85714070") add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) unshare(0x400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmmsg(r7, &(0x7f00000016c0)=[{{&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}}, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=ANY=[]}}], 0x1, 0x0) getpeername(r7, &(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000440)=0xfffffffffffffd28) sendto$packet(r0, &(0x7f0000000240)="8a8386c517598b4c4c9e22af5c2a016fe3d964a077d781526e263cf1", 0x1c, 0x40, &(0x7f0000000280)={0x11, 0xd, r8, 0x1, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) [ 870.247043] REISERFS (device loop6): found reiserfs format "3.5" with non-standard journal [ 870.290108] REISERFS (device loop6): using ordered data mode [ 870.298563] reiserfs: using flush barriers [ 870.393639] ================================================================== [ 870.401088] BUG: KASAN: use-after-free in __lock_acquire+0x3829/0x5020 [ 870.407799] Read of size 8 at addr ffff880160f672f8 by task syz-executor6/15178 [ 870.415245] [ 870.416906] CPU: 1 PID: 15178 Comm: syz-executor6 Not tainted 4.19.0-rc1-next-20180830+ #52 [ 870.425401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.434764] Call Trace: [ 870.437374] dump_stack+0x1c9/0x2b4 [ 870.441013] ? dump_stack_print_info.cold.2+0x52/0x52 [ 870.446214] ? printk+0xa7/0xcf [ 870.449504] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 870.454271] ? __lock_acquire+0x3829/0x5020 [ 870.458603] print_address_description+0x6c/0x20b [ 870.468745] ? __lock_acquire+0x3829/0x5020 [ 870.473090] kasan_report.cold.7+0x242/0x30d [ 870.477514] __asan_report_load8_noabort+0x14/0x20 [ 870.482450] __lock_acquire+0x3829/0x5020 [ 870.486628] ? find_held_lock+0x36/0x1c0 [ 870.490698] ? mark_held_locks+0xc9/0x160 [ 870.500026] ? mark_held_locks+0x160/0x160 [ 870.504280] ? lockdep_hardirqs_on+0x421/0x5c0 [ 870.508866] ? trace_hardirqs_on+0xbd/0x2c0 [ 870.513207] ? kasan_check_read+0x11/0x20 [ 870.517365] ? finish_task_switch+0x1d3/0x870 [ 870.521867] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 870.526991] ? compat_start_thread+0x80/0x80 [ 870.531422] ? _raw_spin_unlock_irq+0x27/0x70 [ 870.535933] ? finish_task_switch+0x1d3/0x870 [ 870.540435] ? finish_task_switch+0x18a/0x870 [ 870.544937] ? __switch_to_asm+0x34/0x70 [ 870.549007] ? preempt_notifier_register+0x200/0x200 [ 870.554121] ? __switch_to_asm+0x34/0x70 [ 870.558192] ? __switch_to_asm+0x34/0x70 [ 870.562259] ? __switch_to_asm+0x40/0x70 [ 870.566428] ? __switch_to_asm+0x34/0x70 [ 870.570989] ? __switch_to_asm+0x40/0x70 [ 870.575052] ? __switch_to_asm+0x34/0x70 [ 870.579125] ? __switch_to_asm+0x40/0x70 [ 870.583188] ? __switch_to_asm+0x34/0x70 [ 870.587250] ? __switch_to_asm+0x34/0x70 [ 870.591315] ? __switch_to_asm+0x40/0x70 [ 870.595378] ? __switch_to_asm+0x34/0x70 [ 870.599443] ? __switch_to_asm+0x40/0x70 [ 870.603506] ? __switch_to_asm+0x34/0x70 [ 870.607570] ? __switch_to_asm+0x40/0x70 [ 870.611638] ? __schedule+0x884/0x1df0 [ 870.615532] ? __sched_text_start+0x8/0x8 [ 870.619695] lock_acquire+0x1e4/0x4f0 [ 870.623504] ? blkdev_get+0x5f2/0xb50 [ 870.627308] ? lock_release+0x9f0/0x9f0 [ 870.631286] ? check_same_owner+0x340/0x340 [ 870.635610] ? do_raw_spin_lock+0xc1/0x200 [ 870.639850] ? blkdev_get+0x5f2/0xb50 [ 870.643665] __mutex_lock+0x171/0x1700 [ 870.653127] ? blkdev_get+0x5f2/0xb50 [ 870.659101] ? blkdev_get+0x5f2/0xb50 [ 870.662914] ? lock_downgrade+0x8f0/0x8f0 [ 870.667050] ? mutex_trylock+0x2b0/0x2b0 [ 870.671116] ? kasan_check_read+0x11/0x20 [ 870.675264] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 870.679831] ? mark_held_locks+0xc9/0x160 [ 870.684080] ? iput+0x5ff/0xa00 [ 870.687351] ? inode_add_lru+0x2a0/0x2a0 [ 870.691400] ? kasan_check_write+0x14/0x20 [ 870.695622] ? do_raw_spin_lock+0xc1/0x200 [ 870.699904] ? kobject_put+0x8e/0x280 [ 870.703694] ? __blkdev_get+0x4ab/0x13c0 [ 870.707742] ? blkdev_get_block+0xc0/0xc0 [ 870.711882] ? kasan_check_write+0x14/0x20 [ 870.716108] mutex_lock_nested+0x16/0x20 [ 870.720274] ? mutex_lock_nested+0x16/0x20 [ 870.724495] blkdev_get+0x5f2/0xb50 [ 870.728167] ? _raw_spin_unlock+0x22/0x30 [ 870.732377] ? blkdev_direct_IO+0x11a0/0x11a0 [ 870.736895] ? bdget+0x5e0/0x5e0 [ 870.740254] ? bd_may_claim+0xd0/0xd0 [ 870.744043] ? allocate_bitmap_node.isra.6+0x1b2/0x260 [ 870.749426] ? journal_transaction_is_valid+0xbc0/0xbc0 [ 870.754780] ? reiserfs_allocate_list_bitmaps+0x5d/0x110 [ 870.760226] blkdev_get_by_dev+0x3f/0x80 [ 870.764275] journal_init+0xcad/0x6a20 [ 870.768160] ? trace_hardirqs_on+0xbd/0x2c0 [ 870.772475] ? vprintk_emit+0x33a/0x910 [ 870.776439] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 870.781529] ? kasan_check_write+0x14/0x20 [ 870.785760] ? do_raw_spin_lock+0xc1/0x200 [ 870.789999] ? journal_release_error+0xa0/0xa0 [ 870.794629] ? devkmsg_read+0xba0/0xba0 [ 870.798609] ? console_trylock+0x15/0xa0 [ 870.802658] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 870.807750] ? vprintk_emit+0x31f/0x910 [ 870.811713] ? wake_up_klogd+0xcb/0x110 [ 870.815675] ? console_device+0xc0/0xc0 [ 870.819636] ? vprintk_emit+0x31f/0x910 [ 870.823608] ? __down_trylock_console_sem+0x155/0x200 [ 870.828843] ? vprintk_emit+0x268/0x910 [ 870.832837] ? wake_up_klogd+0x110/0x110 [ 870.836893] ? vprintk_default+0x28/0x30 [ 870.840948] ? vprintk_func+0x81/0x117 [ 870.844823] ? printk+0xa7/0xcf [ 870.848100] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 870.852884] ? map_vm_area+0xb2/0xf0 [ 870.856586] ? vprintk_default+0x28/0x30 [ 870.860631] ? vprintk_func+0x81/0x117 [ 870.864502] ? printk+0xa7/0xcf [ 870.867767] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 870.872518] ? memset+0x31/0x40 [ 870.875803] ? reiserfs_fill_super.cold.20+0x5/0x16 [ 870.880820] reiserfs_fill_super+0xd74/0x3930 [ 870.885303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.890827] ? finish_unfinished+0x14e0/0x14e0 [ 870.895397] ? format_decode+0x1b1/0xaf0 [ 870.899445] ? set_precision+0xe0/0xe0 [ 870.903348] ? do_raw_spin_unlock+0xa7/0x2f0 [ 870.907746] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.913270] ? vsnprintf+0x20d/0x1b60 [ 870.917080] ? pointer+0x990/0x990 [ 870.920620] ? snprintf+0xae/0xe0 [ 870.924087] ? vsprintf+0x40/0x40 [ 870.927535] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 870.932543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.938083] mount_bdev+0x314/0x3e0 [ 870.941702] ? finish_unfinished+0x14e0/0x14e0 [ 870.946284] get_super_block+0x3c/0x50 [ 870.950163] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 870.954473] legacy_get_tree+0x131/0x460 [ 870.958521] vfs_get_tree+0x1cb/0x5c0 [ 870.962308] do_mount+0x6f9/0x1e30 [ 870.965834] ? rcu_is_watching+0x8c/0x150 [ 870.969996] ? trace_hardirqs_on+0xbd/0x2c0 [ 870.974309] ? copy_mount_string+0x40/0x40 [ 870.978530] ? copy_mount_options+0x5f/0x380 [ 870.982950] ? kmem_cache_alloc_trace+0x324/0x730 [ 870.987799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.993322] ? _copy_from_user+0xdf/0x150 [ 870.997457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.002981] ? copy_mount_options+0x285/0x380 [ 871.007465] ksys_mount+0x12d/0x140 [ 871.011085] __x64_sys_mount+0xbe/0x150 [ 871.015049] do_syscall_64+0x1b9/0x820 [ 871.018935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 871.024313] ? syscall_return_slowpath+0x5e0/0x5e0 [ 871.029228] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 871.034238] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 871.039242] ? recalc_sigpending_tsk+0x180/0x180 [ 871.043983] ? kasan_check_write+0x14/0x20 [ 871.048204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.053039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.058223] RIP: 0033:0x459aba [ 871.061415] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 871.080303] RSP: 002b:00007f6fb480ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 871.088036] RAX: ffffffffffffffda RBX: 00007f6fb480bb30 RCX: 0000000000459aba [ 871.095298] RDX: 00007f6fb480bad0 RSI: 0000000020000040 RDI: 00007f6fb480baf0 [ 871.102553] RBP: 0000000020000040 R08: 00007f6fb480bb30 R09: 00007f6fb480bad0 [ 871.109805] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000000000003 [ 871.117084] R13: 0000000000008000 R14: 00000000004c9fad R15: 0000000000000000 [ 871.124340] [ 871.125954] Allocated by task 15178: [ 871.129654] save_stack+0x43/0xd0 [ 871.133091] kasan_kmalloc+0xc4/0xe0 [ 871.136796] kasan_slab_alloc+0x12/0x20 [ 871.140816] kmem_cache_alloc+0x12e/0x710 [ 871.144960] bdev_alloc_inode+0x1b/0x40 [ 871.148934] alloc_inode+0x63/0x190 [ 871.152543] iget5_locked+0x12e/0x1d0 [ 871.156327] bdget+0xb7/0x5e0 [ 871.159416] blkdev_get_by_dev+0x24/0x80 [ 871.163473] journal_init+0xcad/0x6a20 [ 871.167344] reiserfs_fill_super+0xd74/0x3930 [ 871.171822] mount_bdev+0x314/0x3e0 [ 871.175434] get_super_block+0x3c/0x50 [ 871.179304] legacy_get_tree+0x131/0x460 [ 871.183351] vfs_get_tree+0x1cb/0x5c0 [ 871.187144] do_mount+0x6f9/0x1e30 [ 871.190676] ksys_mount+0x12d/0x140 [ 871.194286] __x64_sys_mount+0xbe/0x150 [ 871.198247] do_syscall_64+0x1b9/0x820 [ 871.202129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.207307] [ 871.208918] Freed by task 15214: [ 871.212270] save_stack+0x43/0xd0 [ 871.215716] __kasan_slab_free+0x11a/0x170 [ 871.219935] kasan_slab_free+0xe/0x10 [ 871.223718] kmem_cache_free+0x86/0x280 [ 871.227675] bdev_i_callback+0x20/0x30 [ 871.231582] rcu_process_callbacks+0xf78/0x27c0 [ 871.236359] __do_softirq+0x2eb/0xa74 [ 871.240144] [ 871.241768] The buggy address belongs to the object at ffff880160f67280 [ 871.241768] which belongs to the cache bdev_cache(65:syz6) of size 1344 [ 871.255206] The buggy address is located 120 bytes inside of [ 871.255206] 1344-byte region [ffff880160f67280, ffff880160f677c0) [ 871.267155] The buggy address belongs to the page: [ 871.272079] page:ffffea000583d9c0 count:1 mapcount:0 mapping:ffff8801b32cf340 index:0xffff880160f67ffe [ 871.281513] flags: 0x2fffc0000000100(slab) [ 871.285746] raw: 02fffc0000000100 ffffea0005cbd608 ffffea0005cb9688 ffff8801b32cf340 [ 871.293610] raw: ffff880160f67ffe ffff880160f67280 0000000100000002 ffff8801b3ece280 [ 871.301604] page dumped because: kasan: bad access detected [ 871.307297] page->mem_cgroup:ffff8801b3ece280 [ 871.311769] [ 871.313383] Memory state around the buggy address: [ 871.318317] ffff880160f67180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 871.325662] ffff880160f67200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 871.333004] >ffff880160f67280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 871.340344] ^ [ 871.347603] ffff880160f67300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 871.354950] ffff880160f67380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 871.362290] ================================================================== [ 871.369637] Disabling lock debugging due to kernel taint [ 871.375083] Kernel panic - not syncing: panic_on_warn set ... [ 871.375083] [ 871.382453] CPU: 1 PID: 15178 Comm: syz-executor6 Tainted: G B 4.19.0-rc1-next-20180830+ #52 [ 871.392312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.401652] Call Trace: [ 871.404231] dump_stack+0x1c9/0x2b4 [ 871.407846] ? dump_stack_print_info.cold.2+0x52/0x52 [ 871.413025] ? lock_downgrade+0x8f0/0x8f0 [ 871.417160] panic+0x238/0x4e7 [ 871.420346] ? add_taint.cold.5+0x16/0x16 [ 871.424477] ? add_taint.cold.5+0x5/0x16 [ 871.428522] ? trace_hardirqs_off+0xaf/0x2b0 [ 871.432917] ? __lock_acquire+0x3829/0x5020 [ 871.437313] kasan_end_report+0x47/0x4f [ 871.441280] kasan_report.cold.7+0x76/0x30d [ 871.445587] __asan_report_load8_noabort+0x14/0x20 [ 871.450503] __lock_acquire+0x3829/0x5020 [ 871.454635] ? find_held_lock+0x36/0x1c0 [ 871.458688] ? mark_held_locks+0xc9/0x160 [ 871.462834] ? mark_held_locks+0x160/0x160 [ 871.467062] ? lockdep_hardirqs_on+0x421/0x5c0 [ 871.471633] ? trace_hardirqs_on+0xbd/0x2c0 [ 871.475947] ? kasan_check_read+0x11/0x20 [ 871.480090] ? finish_task_switch+0x1d3/0x870 [ 871.484580] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 871.489669] ? compat_start_thread+0x80/0x80 [ 871.494076] ? _raw_spin_unlock_irq+0x27/0x70 [ 871.498563] ? finish_task_switch+0x1d3/0x870 [ 871.503068] ? finish_task_switch+0x18a/0x870 [ 871.507556] ? __switch_to_asm+0x34/0x70 [ 871.514859] ? preempt_notifier_register+0x200/0x200 [ 871.519964] ? __switch_to_asm+0x34/0x70 [ 871.524018] ? __switch_to_asm+0x34/0x70 [ 871.528081] ? __switch_to_asm+0x40/0x70 [ 871.532147] ? __switch_to_asm+0x34/0x70 [ 871.536207] ? __switch_to_asm+0x40/0x70 [ 871.540281] ? __switch_to_asm+0x34/0x70 [ 871.544369] ? __switch_to_asm+0x40/0x70 [ 871.548422] ? __switch_to_asm+0x34/0x70 [ 871.552469] ? __switch_to_asm+0x34/0x70 [ 871.556523] ? __switch_to_asm+0x40/0x70 [ 871.560573] ? __switch_to_asm+0x34/0x70 [ 871.564624] ? __switch_to_asm+0x40/0x70 [ 871.568680] ? __switch_to_asm+0x34/0x70 [ 871.572730] ? __switch_to_asm+0x40/0x70 [ 871.576777] ? __schedule+0x884/0x1df0 [ 871.580652] ? __sched_text_start+0x8/0x8 [ 871.584795] lock_acquire+0x1e4/0x4f0 [ 871.588590] ? blkdev_get+0x5f2/0xb50 [ 871.592380] ? lock_release+0x9f0/0x9f0 [ 871.596344] ? check_same_owner+0x340/0x340 [ 871.600649] ? do_raw_spin_lock+0xc1/0x200 [ 871.604906] ? blkdev_get+0x5f2/0xb50 [ 871.608693] __mutex_lock+0x171/0x1700 [ 871.612591] ? blkdev_get+0x5f2/0xb50 [ 871.616415] ? blkdev_get+0x5f2/0xb50 [ 871.620201] ? lock_downgrade+0x8f0/0x8f0 [ 871.624335] ? mutex_trylock+0x2b0/0x2b0 [ 871.628388] ? kasan_check_read+0x11/0x20 [ 871.632523] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 871.637091] ? mark_held_locks+0xc9/0x160 [ 871.641234] ? iput+0x5ff/0xa00 [ 871.644500] ? inode_add_lru+0x2a0/0x2a0 [ 871.648549] ? kasan_check_write+0x14/0x20 [ 871.652772] ? do_raw_spin_lock+0xc1/0x200 [ 871.657005] ? kobject_put+0x8e/0x280 [ 871.660794] ? __blkdev_get+0x4ab/0x13c0 [ 871.664842] ? blkdev_get_block+0xc0/0xc0 [ 871.668999] ? kasan_check_write+0x14/0x20 [ 871.673221] mutex_lock_nested+0x16/0x20 [ 871.677269] ? mutex_lock_nested+0x16/0x20 [ 871.681492] blkdev_get+0x5f2/0xb50 [ 871.685110] ? _raw_spin_unlock+0x22/0x30 [ 871.689256] ? blkdev_direct_IO+0x11a0/0x11a0 [ 871.693738] ? bdget+0x5e0/0x5e0 [ 871.697089] ? bd_may_claim+0xd0/0xd0 [ 871.700891] ? allocate_bitmap_node.isra.6+0x1b2/0x260 [ 871.706159] ? journal_transaction_is_valid+0xbc0/0xbc0 [ 871.711507] ? reiserfs_allocate_list_bitmaps+0x5d/0x110 [ 871.716942] blkdev_get_by_dev+0x3f/0x80 [ 871.721011] journal_init+0xcad/0x6a20 [ 871.724901] ? trace_hardirqs_on+0xbd/0x2c0 [ 871.729211] ? vprintk_emit+0x33a/0x910 [ 871.733175] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 871.738268] ? kasan_check_write+0x14/0x20 [ 871.742553] ? do_raw_spin_lock+0xc1/0x200 [ 871.746774] ? journal_release_error+0xa0/0xa0 [ 871.751341] ? devkmsg_read+0xba0/0xba0 [ 871.755302] ? console_trylock+0x15/0xa0 [ 871.759350] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 871.764439] ? vprintk_emit+0x31f/0x910 [ 871.768402] ? wake_up_klogd+0xcb/0x110 [ 871.772358] ? console_device+0xc0/0xc0 [ 871.776320] ? vprintk_emit+0x31f/0x910 [ 871.780320] ? __down_trylock_console_sem+0x155/0x200 [ 871.785495] ? vprintk_emit+0x268/0x910 [ 871.789453] ? wake_up_klogd+0x110/0x110 [ 871.793503] ? vprintk_default+0x28/0x30 [ 871.797548] ? vprintk_func+0x81/0x117 [ 871.801419] ? printk+0xa7/0xcf [ 871.804683] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 871.809422] ? map_vm_area+0xb2/0xf0 [ 871.813129] ? vprintk_default+0x28/0x30 [ 871.817201] ? vprintk_func+0x81/0x117 [ 871.821110] ? printk+0xa7/0xcf [ 871.824394] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 871.829154] ? memset+0x31/0x40 [ 871.832449] ? reiserfs_fill_super.cold.20+0x5/0x16 [ 871.837456] reiserfs_fill_super+0xd74/0x3930 [ 871.841963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.848642] ? finish_unfinished+0x14e0/0x14e0 [ 871.853212] ? format_decode+0x1b1/0xaf0 [ 871.857268] ? set_precision+0xe0/0xe0 [ 871.861148] ? do_raw_spin_unlock+0xa7/0x2f0 [ 871.865571] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 871.871093] ? vsnprintf+0x20d/0x1b60 [ 871.874893] ? pointer+0x990/0x990 [ 871.878416] ? snprintf+0xae/0xe0 [ 871.881857] ? vsprintf+0x40/0x40 [ 871.885303] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 871.890326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.895855] mount_bdev+0x314/0x3e0 [ 871.899475] ? finish_unfinished+0x14e0/0x14e0 [ 871.904045] get_super_block+0x3c/0x50 [ 871.908013] ? reiserfs_kill_sb+0x1e0/0x1e0 [ 871.912321] legacy_get_tree+0x131/0x460 [ 871.916391] vfs_get_tree+0x1cb/0x5c0 [ 871.920196] do_mount+0x6f9/0x1e30 [ 871.923730] ? rcu_is_watching+0x8c/0x150 [ 871.927864] ? trace_hardirqs_on+0xbd/0x2c0 [ 871.932181] ? copy_mount_string+0x40/0x40 [ 871.936409] ? copy_mount_options+0x5f/0x380 [ 871.941295] ? kmem_cache_alloc_trace+0x324/0x730 [ 871.946148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 871.951714] ? _copy_from_user+0xdf/0x150 [ 871.955858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.961394] ? copy_mount_options+0x285/0x380 [ 871.965892] ksys_mount+0x12d/0x140 [ 871.969523] __x64_sys_mount+0xbe/0x150 [ 871.973484] do_syscall_64+0x1b9/0x820 [ 871.977360] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 871.982727] ? syscall_return_slowpath+0x5e0/0x5e0 [ 871.987644] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 871.992649] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 871.997651] ? recalc_sigpending_tsk+0x180/0x180 [ 872.002393] ? kasan_check_write+0x14/0x20 [ 872.006623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.011467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.016641] RIP: 0033:0x459aba [ 872.019829] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 872.038761] RSP: 002b:00007f6fb480ba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 872.046478] RAX: ffffffffffffffda RBX: 00007f6fb480bb30 RCX: 0000000000459aba [ 872.053732] RDX: 00007f6fb480bad0 RSI: 0000000020000040 RDI: 00007f6fb480baf0 [ 872.060985] RBP: 0000000020000040 R08: 00007f6fb480bb30 R09: 00007f6fb480bad0 [ 872.068242] R10: 0000000000008000 R11: 0000000000000206 R12: 0000000000000003 [ 872.075501] R13: 0000000000008000 R14: 00000000004c9fad R15: 0000000000000000 [ 872.083071] Dumping ftrace buffer: [ 872.086606] (ftrace buffer empty) [ 872.090492] Kernel Offset: disabled [ 872.094100] Rebooting in 86400 seconds..